+ All Categories
Home > Documents > Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for...

Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for...

Date post: 10-Jun-2018
Category:
Upload: vuonglien
View: 228 times
Download: 0 times
Share this document with a friend
215
Centrify Infrastructure Services Auditing Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation
Transcript
Page 1: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Centrify Infrastructure Services

Auditing Administrator’s Guide February 2018 (update for release 2017.3)

Centrify Corporation

Page 2: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Legal noticeThis document and the software described in this document are furnished under and are subject to the terms of a license agreement or a non-disclosure agreement. Except as expressly set forth in such license agreement or non-disclosure agreement, Centrify Corporation provides this document and the software described in this document “as is” without warranty of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. Some states do not allow disclaimers of express or implied warranties in certain transactions; therefore, this statement may not apply to you.

This document and the software described in this document may not be lent, sold, or given away without the prior written permission of Centrify Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of Centrify Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data.

This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Centrify Corporation may make improvements in or changes to the software described in this document at any time.

© 2004-2018 Centrify Corporation. All rights reserved. Portions of Centrify software are derived from third party or open source software. Copyright and legal notices for these sources are listed separately in the Acknowledgements.txt file included with the software.

U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement.

Centrify, DirectControl, DirectAuthorize, DirectAudit, DirectSecure, DirectControl Express, Centrify for Mobile, Centrify for SaaS, DirectManage, Centrify Express, DirectManage Express, Centrify Suite, Centrify User Suite, Centrify Identity Service, Centrify Privilege Service and Centrify Server Suite are registered trademarks of Centrify Corporation in the United States and other countries. Microsoft, Active Directory, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries.

Centrify software is protected by U.S. Patents 7,591,005; 8,024,360; 8,321,523; 9,015,103; 9,112,846; 9,197,670; 9,442,962 and 9,378,391.

The names of any other companies and products mentioned in this document may be the trademarks or registered trademarks of their respective owners. Unless otherwise noted, all of the names used as examples of companies, organizations, domain names, people and events herein are fictitious. No association with any real company, organization, domain name, person, or event is intended or should be inferred.

Page 3: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Contents

About this guide 8

Intended audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Using this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Finding more information about Centrify products . . . . . . . . . . . . . . . . . . . 10

Contacting Centrify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Getting additional support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Chapter 1 Overview of the auditing infrastructure 12

Deciding whether to audit user activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Capturing detailed and summary information for user sessions . . . . . . . . 13

Reviewing recorded activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Auditing requires a scalable architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

How audited sessions are collected and stored . . . . . . . . . . . . . . . . . . . . . . 16

Deploying auditing components in an audit installation . . . . . . . . . . . . . . . 17Planning where to install auditing components . . . . . . . . . . . . . . . . . .18Using multiple databases in an audit store . . . . . . . . . . . . . . . . . . . . . .19Using multiple consoles in an installation . . . . . . . . . . . . . . . . . . . . . . .19

Agent components on audited UNIX computers. . . . . . . . . . . . . . . . . . . . . . 20

Agent components on audited Windows computers . . . . . . . . . . . . . . . . . . 21

Chapter 2 Planning a deployment 22

Decide on the scope of the installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Decide where to install the management database . . . . . . . . . . . . . . . . . . . 23

Decide where to install collectors and audit stores . . . . . . . . . . . . . . . . . . . 24Use separate computers for collectors and audit store databases . .24Plan for network traffic and default ports . . . . . . . . . . . . . . . . . . . . . . .25Identify an Active Directory site or subnets . . . . . . . . . . . . . . . . . . . . . .27Determine how many collectors and audit stores to install . . . . . . . .28

1

Page 4: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determine the recommended hardware configuration . . . . . . . . . . . .29Decide where to install agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Decide where to install consoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Make sure you have a supported edition of SQL Server . . . . . . . . . . . . . . . 32

Check SQL Server logins for auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Create security groups for auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34

Determining storage requirements for auditing . . . . . . . . . . . . . . . . . . . . . . 34

What’s involved in the deployment process. . . . . . . . . . . . . . . . . . . . . . . . . . 36Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37Prepare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38Deploy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39Validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39Manage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

Chapter 3 Installing Centrify Auditing and Monitoring Service 41

Installation preview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Install and configure Microsoft SQL Server for auditing. . . . . . . . . . . . . . . . 43Downloading and installing SQL Server manually . . . . . . . . . . . . . . . . .44Configuring SQL Server to prepare for auditing . . . . . . . . . . . . . . . . . .44Configuring Amazon RDS for SQL Server for auditing . . . . . . . . . . . . . 45

Install the Audit Manager and Audit Analyzer consoles . . . . . . . . . . . . . . . . 48

Create a new installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49How to create an installation without system administrator privileges 52Create the first audit store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54Create the first audit store database . . . . . . . . . . . . . . . . . . . . . . . . . . .55

Install the audit collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59Set the required permission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60Install the collector service using the setup program . . . . . . . . . . . . . .61Configure the audit collector service . . . . . . . . . . . . . . . . . . . . . . . . . . . .61

Install Windows agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62Verify prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63Installing interactively using the setup program . . . . . . . . . . . . . . . . . 64Deciding to install with or without joining the computer to a zone. . 67Installing silently by using the Microsoft Windows Installer . . . . . . . . 71

Auditing Administrator’s Guide 2

Page 5: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Installing from a central location by using group policy . . . . . . . . . . . 81Install UNIX agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Enabling and disabling auditing on Linux and UNIX computers . . . . .84Install additional Audit Manager or Audit Analyzer consoles . . . . . . . . . . . 85

Chapter 4 Managing an installation 86

Securing an installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Securing an audit store with trusted collectors and agents . . . . . . . .88Securing network traffic with encryption . . . . . . . . . . . . . . . . . . . . . . . .90

Configuring selective auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Configuring agents to prefer collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Adding licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96Audit license enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97Agents and licenses from previous versions of infrastructure services .98

Enabling audit notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Enabling or disabling video capture auditing. . . . . . . . . . . . . . . . . . . . . . . . . 99

Preventing users from reviewing or deleting sessions . . . . . . . . . . . . . . . . 100

Adding an installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101Delegating administrative tasks for a new installation . . . . . . . . . . . .102Opening an installation in a new console . . . . . . . . . . . . . . . . . . . . . . .102Closing an installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102

Publishing installation information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102Permission to publish to Active Directory . . . . . . . . . . . . . . . . . . . . . .103Synchronizing installation information . . . . . . . . . . . . . . . . . . . . . . . . .103Exporting installation information . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103

Removing or deleting an installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Managing audit store databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Selecting a recovery model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106Configuring the maximum memory for audit store databases . . . . .107Using Transact-SQL to configure minimum and maximum memory . . .108Estimating database requirements based on the data you collect .108Reducing color depth to decrease disk usage . . . . . . . . . . . . . . . . . . 110Using SQL Server availability groups with multi-subnet failover for audit

• 3

Page 6: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

store databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111Adding new audit store databases to an installation . . . . . . . . . . . . .111Rotating the active database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112Creating a new database for rotation . . . . . . . . . . . . . . . . . . . . . . . . . .112Database archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Queries during rotation and archiving. . . . . . . . . . . . . . . . . . . . . . . . . 113Database backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Reattaching a restored backup of a database . . . . . . . . . . . . . . . . . . 113Allowed incoming accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Detecting data tampering and verifying session integrity . . . . . . . . 115

Managing audit stores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Configuring audit store scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117Configuring permissions for an audit store . . . . . . . . . . . . . . . . . . . . .117Adding more audit stores to an installation . . . . . . . . . . . . . . . . . . . . .119

Managing the audit management database . . . . . . . . . . . . . . . . . . . . . . . . 120Configuring audit management database scope . . . . . . . . . . . . . . . .121Setting audit management database security . . . . . . . . . . . . . . . . . . .121Configuring the maximum memory for the management database . . .122Removing an audit management database . . . . . . . . . . . . . . . . . . . . .123

Maintaining database indexes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Managing collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Monitoring collector status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126Modifying the command prompt recognized by the collector . . . . .126Removing collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127

Managing audited computers and agents . . . . . . . . . . . . . . . . . . . . . . . . . . 128Monitoring agent status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128Configuring the UNIX agent off-line database . . . . . . . . . . . . . . . . . . .128Removing an audited computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129

Delegating administrative permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Publishing installation information . . . . . . . . . . . . . . . . . . . . . . . . . . . .129

Managing audit roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Creating custom audit roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130Changing audit role properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132Granting permissions to manage audit roles . . . . . . . . . . . . . . . . . . . .133

Auditing Administrator’s Guide 4

Page 7: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 5 Querying and reviewing audited activity 134

Accessing audited sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Predefined queries for audit sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Predefined queries for audit events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Predefined queries for reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137User activity report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137Privileged activity report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138Centrify zone administration activity report . . . . . . . . . . . . . . . . . . . .138Login by user report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139Login by computer report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139Authorization failure report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139Monitored execution report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140Detailed execution report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140File monitor report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141MFA Failure Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141

Creating new session queries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Creating a new quick query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142Creating a new private query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144Creating a new shared query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147

Creating queries for audit events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149How Access Manager roles affect audit trail events . . . . . . . . . . . . . .150

Organizing queries in custom folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

Exporting and importing query definitions . . . . . . . . . . . . . . . . . . . . . . . . . 152

Displaying session information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

Adding session reviewers without designating auditing roles . . . . . . . . . 153

Changing the review status for audited sessions . . . . . . . . . . . . . . . . . . . . 154Viewing status history. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Adding comments to a session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Reviewing and deleting your own sessions. . . . . . . . . . . . . . . . . . . . . 156

Playing back a session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156Starting the session player separately . . . . . . . . . . . . . . . . . . . . . . . . .158

Exporting sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

Deleting sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

Viewing sessions outside of Audit Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . 162

• 5

Page 8: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing sessions from Access Manager . . . . . . . . . . . . . . . . . . . . . . . .163Viewing sessions in Active Directory Users and Computers . . . . . . .163Using Find Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163

Chapter 6 Advanced monitoring 166

Set up advanced monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167Advanced monitoring requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 167Configuring advanced monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168Enabling advanced monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

Using the advanced monitoring reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

Chapter 7 Troubleshooting and common questions 171

Checking the status of the UNIX agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Configuring the installation for an agent . . . . . . . . . . . . . . . . . . . . . . .172Checking for disconnected agents using Audit Manager . . . . . . . . . .172Starting and stopping the UNIX agent . . . . . . . . . . . . . . . . . . . . . . . . . .172Detecting the infrastructure services installation status. . . . . . . . . . 173

Viewing and changing log file settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174Enabling detailed logging for Linux and UNIX computers . . . . . . . . .175Enabling detailed logging for the collector service . . . . . . . . . . . . . . .177Enabling detailed logging for auditing consoles . . . . . . . . . . . . . . . . .177

Tracing database operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178Starting a database trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179Stopping the database trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180Exporting the database trace for a management database . . . . . . .180Exporting the database trace for audit store databases . . . . . . . . . .181Delegating database trace management . . . . . . . . . . . . . . . . . . . . . . .182

Stopping auditing on a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182Resuming auditing if the agent stops. . . . . . . . . . . . . . . . . . . . . . . . . . 182Allowing users to log in when auditing is stopped. . . . . . . . . . . . . . . 182

Determining collector status and connectivity . . . . . . . . . . . . . . . . . . . . . . 183Resolving connectivity issues between a collector and an audit store .185Resolving authentication issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186Monitoring collector performance counters. . . . . . . . . . . . . . . . . . . . 186

Auditing Administrator’s Guide 6

Page 9: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing Microsoft SQL Server databases . . . . . . . . . . . . . . . . . . . . . . . . . 187Selecting SQL Server or Windows authentication . . . . . . . . . . . . . . . .187Connecting to an installation or database . . . . . . . . . . . . . . . . . . . . . .188Assigning the service principal name for SQL Server . . . . . . . . . . . . .189

Publishing installation information in Active Directory . . . . . . . . . . . . . . . 189

Monitoring file system disk space usage . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

Chapter 8 Command line programs for managing audited sessions 191

How to use command line programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Displaying usage information and man pages . . . . . . . . . . . . . . . . . . . . . . 192

Using commands for administrative tasks . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Chapter 9 Installing the UNIX agent on remote computers 196

Deploying the agent from a Windows computer. . . . . . . . . . . . . . . . . . . . . 196

Installing the agent silently using a configuration file. . . . . . . . . . . . . . . . . 196

Using other programs to install the UNIX agent . . . . . . . . . . . . . . . . . . . . . 198

Chapter 10 Permissions required to perform administrative and auditing tasks200

Setting and synchronizing audit-related permissions . . . . . . . . . . . . . . . . 200

Installation permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Setting installation permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204

Management database permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204Setting management database permissions . . . . . . . . . . . . . . . . . . . .206

Audit store and audit store database permissions . . . . . . . . . . . . . . . . . . . 206

Audit role permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

Auditor permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Glossary 211

• 7

Page 10: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

About this guide

The Auditing Administrator’s Guide provides complete information for installing and configuring the auditing infrastructure, including guidelines for planning your deployment, managing audited activity, and how to use Audit Analyzer to find and replay captured user sessions. Centrify software helps you comply with regulatory requirements and improve accountability by collecting detailed information about user activity on Linux, UNIX, and Windows computers. The Centrify auditing features enable you to monitor user activity for immediate analysis or specific incidents, such as application failures or security breaches.

Intended audienceThis guide is intended for administrators responsible for installing and maintaining auditing-related software and the databases that store audit-related data, including the roles and permissions assigned to the users and groups who are responsible for monitoring and reviewing user activity on audited computers. In addition, some of the information in this guide is intended for security personnel and auditors who are responsible for identifying audit requirements, querying the audit store databases, examining user activity, and managing the status of sessions they have reviewed.

Using this guideDepending on your environment and role as an administrator or auditor, you may want to read portions of this guide selectively. The guide provides the following information:

Chapter 1, “Overview of the auditing infrastructure,” provides an overview of what you can audit and how auditing works.

Chapter 2, “Planning a deployment,” explains how to prepare for the deployment of auditing components.

8

Page 11: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Conventions used in this guide

Chapter 3, “Installing Centrify Auditing and Monitoring Service,” explains how to install and configure auditing components in a production environment.

Chapter 4, “Managing an installation,” explains how to secure, change, reconfigure, add, and remove auditing components.

Chapter 5, “Querying and reviewing audited activity,” explains how to use Audit Analyzer to find and review the audited sessions and audit trail events in which you are interested.

Chapter 6, “Advanced monitoring,” explains how to use the advanced monitoring features to gather additional information about which users and what programs are accessing or modifying production systems.

Chapter 7, “Troubleshooting and common questions,” describes how to view log files and diagnostics for components of the auditing infrastructure and how to identify and resolve common issues.

Chapter 8, “Command line programs for managing audited sessions,” provides a summary of the command line programs and Windows utilities.

Chapter 9, “Installing the UNIX agent on remote computers,” describes how to install the agent package using non-interactive scripts and native installers.

Chapter 10, “Permissions required to perform administrative and auditing tasks,” discusses the permissions required to perform actions in the Audit Manager and Audit Analyzer consoles.

In addition, an index is provided for your reference.

Conventions used in this guideThe following conventions are used in this guide:

Fixed-width font is used for sample code, program names, program output, file names, and commands that you type at the command line. When italicized, this font indicates variables. Square brackets ([ ]) indicate optional command-line arguments.

Bold text is used to emphasize commands or key command results; buttons or user interface text; and new terms.

• About this guide 9

Page 12: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Finding more information about Centrify products

Italics are used for book titles and to emphasize specific words or terms. In fixed-width font, italics indicate variable values.

Standalone software packages include version and architecture information in the file name. Full file names are not documented in this guide. For complete file names for the software packages you want to install, see the distribution media.

Finding more information about Centrify products

Centrify provides extensive documentation targeted for specific audiences, functional roles, or topics of interest. If you want to learn more about Centrify and Centrify products and features, start by visiting the Centrify website. From the Centrify website, you can download data sheets and evaluation software, view video demonstrations and technical presentations about Centrify products, and get the latest news about upcoming events and webinars.

For access to documentation for all Centrify products and services, visit the Centrify documentation portal. From the Centrify documentation portal, you can always view or download the most up-to-date version of this guide and all other product documentation.

To get to the documentation portal, go to docs.centrify.com or https://www.centrify.com/support/documentation.

Contacting CentrifyYou can contact Centrify by visiting our website, www.centrify.com. On the website, you can find information about Centrify office locations worldwide, email and phone numbers for contacting Centrify sales, and links for following Centrify on social media. If you have questions or comments, we look forward to hearing from you.

Getting additional supportIf you have a Centrify account, click Support on the Centrify website to log on and access the Centrify Customer Support Portal. From the

Auditing Administrator’s Guide 10

Page 13: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Getting additional support

support portal, you can to search knowledge base articles, open and view support cases, connect with other Centrify users on customer forums, and access additional resources—such as online training, how-to videos, and diagnostic tools.

• About this guide 11

Page 14: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 1

Overview of the auditing infrastructure

Auditing is a key feature of Centrify Infrastructure Services. If you choose to enable auditing in your organization, you can capture detailed information about user activity on Linux, UNIX, and Windows computers and store that activity to improve regulatory compliance and accountability and mitigate security risks. This chapter provides an overview of the auditing infrastructure, including key components and terminology.

The following topics are covered:

Deciding whether to audit user activity

Capturing detailed and summary information for user sessions

Reviewing recorded activity

Auditing requires a scalable architecture

How audited sessions are collected and stored

Deploying auditing components in an audit installation

Agent components on audited UNIX computers

Agent components on audited Windows computers

Deciding whether to audit user activityJust as it is important to protect assets and resources from unauthorized access, it is equally important to track what users who have permission to access those resources are doing or have done in the past. For users who have privileged access to computers and applications with sensitive information, auditing their actions helps ensure accountability and improve regulatory compliance.

There are many reasons for organizations to establish auditing policies and enable auditing of user activity. For example, you might want to audit activity for any of the following reasons:

12

Page 15: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Capturing detailed and summary information for user sessions

To prove certain computers or applications are secure in order to comply with government or industry regulatory requirements.

To report on actions taken by users with elevated privileges.

To prevent the use of shared passwords when more than one person needs administrative access to a computer or an application.

To improve accountability when users with elevated permissions have access to privileged resources.

To detect suspicious activity and mitigate the threat posed by malicious insiders or third parties who have access to sensitive systems.

To pinpoint actions that may have caused failures and simplify troubleshooting procedures.

To capture information, such as the steps that resolved an open case, that can be used to help your organization improve its helpdesk operations or security procedures.

Capturing detailed and summary information for user sessions

After you deploy the auditing infrastructure, you can capture detailed information about user activity and the events that occurred on the computers you choose to audit. On those computers, an agent starts recording user activity when a user selects an audited role or starts a login shell locally, using a remote shell, or through a virtual network connection such as Citrix or VNC.

Each record of continuous user activity is called a session. A session ends when the user logs out, disconnects, or is inactive long enough to lock the desktop. If the user reconnects or unlocks the desktop, the agent resumes recording the user’s activity as a new session. When users start a new session on an audited computer, they can be notified that their session is being audited but they cannot turn off auditing except by logging off, so you have a complete record of what happened, includes an audit trail of the actions a user has taken.

Chapter 1 • Overview of the auditing infrastructure 13

Page 16: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Reviewing recorded activity

You can choose whether to record only summaries of user activity or a full visual record of user activity. When auditing Windows computers, each session is a video capture of everything that takes place on the desktop, including the applications opened, text that was entered, and the results that were displayed. When auditing Linux and UNIX computers, the agent records shell activity, such as the commands a user runs or the changes made to key files and data. On Linux and UNIX computers, actions performed using a display manager, such as GNOME or KDE, are not recorded.

In addition to capturing detailed information about user activity, sessions provide a summary of actions taken so that you can scan the applications opened or commands executed for potentially interesting or damaging actions without playing back a complete session. After you select a session of interest in the Audit Analyzer, the console displays an indexed list of actions taken in the order in which they occurred. You can then select any entry in the list to start viewing the session beginning with that action. For example, if a user opened an application that stores credit card information, you can scan the list of actions for that event and begin reviewing what happened in the session from the time the user opened that particular application.

If users change their account permissions to take any action with elevated privileges, the change is recorded as an audit trail event. You can also search for these events to find sessions of interest.

Reviewing recorded activityThe information recorded in each session is transferred to a Microsoft SQL Server database so that it is available for querying and playback. Because the information is collected as it happens, you can monitor computers for suspicious activity or troubleshoot problems immediately after they occur.

You can also search for and play back sessions to locate past events that occurred on specific computers or that affected particular users. For example, you might be interested in activity that occurred immediately before a security breach or want to investigate the cause of an application failure. Similarly, a security expert might want to see who had access to computers with sensitive data, such as payroll information or medical records, during a particular period of time, such as the last 72 hours.

Auditing Administrator’s Guide 14

Page 17: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Auditing requires a scalable architecture

Auditing requires a scalable architectureTo ensure scalability for large organizations and provide fault tolerance, the auditing infrastructure has a multi-tier architecture that consists of the following layers:

Audited computers are the computers on which you want to monitor activity. To be audited, the computer must have an agent installed, audit features enabled, and be joined to an Active Directory domain.

Collectors are intermediate services that receive and compress the captured activity from the agents on audited computers as the activity occurs. You should establish at least two collectors to ensure that auditing is not interrupted. You can add collectors to your installation at any time and it is common to have multiple collectors to provide load balancing and redundancy.

Audit stores define a scope for auditing and include the audit store databases that receive captured activity and audit trail records from the collectors and store it for querying and playback. Audit store databases also keep track of all the agents and collectors you deploy. For scalability and network efficiency, you can have multiple audit stores each with multiple databases.

A management database server is a computer that hosts the Microsoft SQL Server instance with the audit management database. The management database stores information about the overall installation, such as the scope of each audit store, which audit store database is active and where there are attached databases, the audit roles you create, and the permissions you define. The management database enables centralized monitoring and reporting across all audit stores, collectors, and audited computers.

The Audit Manager and Audit Analyzer consoles are the graphical user interfaces which administrators can use to configure and manage the deployment of audit components, such as agents and collectors, or to query and review captured user sessions.

To ensure that audit data transferred over the network is secure, communication between components is authenticated and encrypted.

Chapter 1 • Overview of the auditing infrastructure 15

Page 18: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

How audited sessions are collected and stored

In addition to these core components of the auditing infrastructure, there is a separate Windows service that collects audit trail events when there are audit store databases that are not accessible, for example, because of network issues or the database server is shut down. This audit management server runs as a Windows service and spools the events on the management database, then sends them to the audit store database when the inaccessible database comes back online.

In addition to spooling audit trail events, the audit management server automatically calculates the approximate disk space used by audited sessions on the database server. The audit management server will calculate the session size for all completed audited sessions. The session size is not calculated for in-progress or disconnected sessions. You can view the session size for all completed sessions in the Audit Analyzer console’s query results.

How audited sessions are collected and storedThe agent on each audited computer captures user activity and forwards it to a collector on a Windows computer. If the agent cannot connect to a collector—for example, because all of the computers hosting the collector service for the agent are shut down for maintenance—the agent spools the session data locally and transfers it to a collector later.

The collector sends the data to an audit store server, where the audit data is stored in the Microsoft SQL Server database that you have designated as the active audit store database. As you accumulate data, you can add more SQL Server databases to the audit store to hold historical information or to change the database designated as the active audit store database.

After the audit data is transferred to the audit store database, you can use the Audit Analyzer console to request session data. The audit management database, which stores information about all of the components that make up the auditing infrastructure, retrieves the session data from the appropriate audit store database.

Auditing Administrator’s Guide 16

Page 19: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Deploying auditing components in an audit installation

The following figure illustrates the basic architecture and flow of data with a minimum number of auditing components installed.

In the illustration, each agent connects to one collector. In a production environment, you can configure agents to allow connections to additional collectors for redundancy and load balancing or to prevent connections between specific agents and collectors. You can also add audit stores and configure which connections are allowed or restricted. The size and complexity of the auditing infrastructure depends on how you want to optimize your network topology, how many computers you are auditing, how much audit data you want to collect and store, and how long you plan to retain audit records.

Deploying auditing components in an audit installation

The multi-tiered architecture of the auditing infrastructure is referred to collectively as a DirectAudit installation. The DirectAudit installation represents a logical object similar to an Active Directory forest or site. It encompasses all of the auditing components you deploy—agents, collectors, audit stores, management database, and consoles—regardless of how they are distributed on your network. The installation also defines the scope of audit data available. All queries and reports are against the audit data contained within the installation boundary.

Chapter 1 • Overview of the auditing infrastructure 17

Page 20: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Deploying auditing components in an audit installation

The most common deployment scenario is to have a single audit installation for an entire organization so that all audit data and management of the audit data is centralized. Within a single installation, you can have components wherever they are needed, as long as you have the appropriate network connections that allow them to communicate with each other. The audit data for the entire installation is available to users who have permission to query and view it using a console. For most organizations, having a single installation is a scalable solution that allows a “separation of duties” security model through the use of audit roles. If you establish a single installation, there will be one Master Auditor role for the entire organization, and that Master Auditor can control the audit data that other users and groups can see or respond to by defining roles that limit access rights and privileges.

However, if you have different lines of business with different audit policies—in different geographic locations, or with different administrative groups—you can configure them as separate audit installations. For example, if you have offices in North America and Hong Kong managed by two different IT teams—IT-US and IT-HK—you might want to create two DirectAudit installations to maintain your existing separation of duties for the IT-US and IT-HK teams.

Planning where to install auditing components

Before you install Centrify Auditing and Monitoring Service, you should develop a basic deployment plan for how you will distribute and manage the components that make up an installation. For example, you should decide how many collectors and audit stores to create and where to put them. You should also consider the network connections required and how many computers you plan to audit. For example, you can have multiple agents using the same set of collectors, but you should keep the collectors within one hop of the agents they serve and within one hop of the audit stores to which they transfer data.

By planning where to install components initially, you can determine the number of collectors you should have for load balancing or redundancy. After the initial deployment, you can add collectors and audit stores whenever and wherever they are needed.

Auditing Administrator’s Guide 18

Page 21: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Deploying auditing components in an audit installation

Using multiple databases in an audit store

Each audit store uses Microsoft SQL Server to provide database services to the audit installation. When you install the first audit store, you configure the database instance you want to use and that database becomes the active database for storing incoming audit data. A single audit store, however, can have several databases attached to it. Attached databases store historical information and respond to queries from the management database. You can use the Audit Manager console to control the databases that are attached to the audit store and to designate which database is active. Only one database can be active in an audit store at any given time.

Although the audit store can use multiple databases, the presentation of session data is not affected. If a session spans two or more databases that are attached to the audit store, the Audit Analyzer console presents the data as a single, unbroken session. For example, if you change the active database during a session, some of the session data is stored in the attached database that is no longer active and some of it stored in the newly activated database, but the session data plays back as a single session to the auditor.

Using multiple consoles in an installation

A single installation always has a single audit management database. In most cases, however, you use more than one console to request data from the audit management database. The two most important consoles in an installation are the Audit Manager console and the Audit Analyzer console.

As the audit installation owner, you use the Audit Manager console to configure and manage the auditing components in your installation. In most organizations, there is only one Audit Manager console installed.

Auditors use the Audit Analyzer console to search, retrieve, and play back sessions. The auditor can use predefined queries to find sessions or define new queries. Auditors can also choose whether to share their queries with other auditors or keep them private. In most organizations, there are multiple Audit Analyzer consoles installed.

Chapter 1 • Overview of the auditing infrastructure 19

Page 22: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Agent components on audited UNIX computers

In addition to the Audit Manager and Audit Analyzer consoles, you can use the Agent Control Panel and the Collector Control Panel to configure and manage agents and collectors.

The following figure shows the architecture of a medium-size installation.

Agent components on audited UNIX computersTo enable auditing for Linux and UNIX computers, you must install the Centrify UNIX agent on the computers you want to audit and make sure the computers are joined to an Active Directory domain. Joining a domain is required to ensure that authentication and authorization services are provided by Active Directory. To enable auditing on a computer, the Centrify UNIX agent includes the following components:

dad—the core auditing service that collects the audit data and either sends it to a collector or spools it locally until a collector is available.

cdash—the UNIX shell wrapper that intercepts all user traffic and sends it to the dad process.

Auditing Administrator’s Guide 20

Page 23: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Agent components on audited Windows computers

dacontrol, dainfo, dareload, and other command-line programs that enable you to manage agent operations from a login shell.

After you enable auditing on a computer, the agent captures all output (stdout), error messages (stderr), and user input (stdin) except for passwords. By default, the agent captures user input even if a user runs commands with echo turned off. For example, if a user logs on, then runs echo off before typing the sudo command, the auditing service captures the sudo entry as part of the user’s session.

Agent components on audited Windows computers

To enable auditing for Windows computers, you must install the Centrify Agent for Windows on the computers you want to audit and make sure the computers are joined to an Active Directory domain. Joining a domain is required to ensure that authentication and authorization services are provided by Active Directory. If you enable auditing for the Centrify Agent for Windows, the agent includes the following components:

wdad—the Windows audit data collection service.

wash—the Windows service that intercepts all user traffic and sends it to the Windows audit data collection service.

The Agent Control Panel—an applet that enables you to configure and manage the agent.

For example, you can use the Agent Control Panel to configure the color depth of audit data to achieve the desired balance between playback screen resolution and audit store database size.

Chapter 1 • Overview of the auditing infrastructure 21

Page 24: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 2

Planning a deployment

This chapter describes the decisions you need to make during the planning phase of a deployment and summarizes what’s involved in deploying auditing components and auditing-related services on the computers to be audited. It includes simplified diagrams that highlight the steps involved.

The following topics are covered:

Decide on the scope of the installation

Decide where to install the management database

Decide where to install collectors and audit stores

Decide where to install agents

Decide where to install consoles

Make sure you have a supported edition of SQL Server

Check SQL Server logins for auditing

Determining storage requirements for auditing

What’s involved in the deployment process

Decide on the scope of the installationBefore you deploy any part of the auditing infrastructure, you should decide on the scope of the audit installation and whether you want to use a single installation for your entire Active Directory site, or separate audit installations for different geographical areas or functional groups.

The most common deployment scenario is a single installation for each Active Directory forest, so that auditors can query and review information for the entire organization. However, if your Active Directory site has more than one forest, you might want to use more than one installation. If you want to use more than one installation,

22

Page 25: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install the management database

you should determine the subnetwork segments that will define the scope of each installation.

In Active Directory, a site represents the collection of Internet Protocol (IP) addresses that describe the physical structure of your network. If you are not familiar with how Active Directory sites are defined, you should consult Microsoft documentation for more information.

Decide where to install the management database

Each audit installation has a single audit management server and audit management database. The management database is a Microsoft SQL Server database that stores information about the installation such as the Active Directory sites or subnets associated with each audit store.

The computer you use for the audit management database should have reliable, high-speed network connectivity. The management database does not store the captured sessions, and is, therefore, much smaller than the audit store databases. There are no specific sizing requirements or recommendations for the management database.

You can use the following guideline as the recommended minimum hardware configuration for the computer you use as the management database:

The audit management server is a Windows service that performs two main tasks:

The service collects audit trail events on the management database, then sends them to the audit store database.

The service automatically calculates the approximate disk space used by audited sessions.

Computer used for

Number of concurrent sessions

CPU cores

CPU speed

Memory

Management database

Any 1 to 2 2.33 GHz 8 GB

Chapter 2 • Planning a deployment 23

Page 26: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Decide where to install collectors and audit stores

Although a collector and an audit store database can be installed on the same computer for evaluation, you should avoid doing so in a production environment. As part of the planning process, therefore, you need to decide where to install collectors and audit store databases. In designing the network topology for the installation, there are several factors to consider. For example, you should consider the following:

Database load and capacity

Network connectivity

Port requirements

Active Directory requirements

The next sections provide guidelines and recommendations to help you decide where to install the collectors and audit store databases required to support the number of computers you plan to audit.

Use separate computers for collectors and audit store databases

To avoid overloading the computers that host collectors and audit store databases, you should install collectors and audit store SQL Server databases on separate computers. Because SQL Server uses physical memory to store database information for fast query results, you should use a dedicated computer for the audit store database, and allocate up to 80% of the computer’s memory to SQL Server. In most installations, you also need to plan for more than one audit store database and to periodically rotate from one database to another to prevent any one database from getting too large. For more information about managing audit store databases, see “Managing audit store databases” on page 104.

Auditing Administrator’s Guide 24

Page 27: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Plan for network traffic and default ports

You should minimize the distance network packets have to travel between an agent and its collector. You should also minimize the distance between collectors and their audit stores. If possible, you should not have more than one gateway or router hop between an agent and its collector.

To help you plan for network traffic, the following ports are used in the initial set of network transactions:

Directory Service - Global Catalog lookup request on port 3268.

Authentication Services - LDAP sealed request on port 389.

Kerberos – Ticket Granting Ticket (TGT) request on port 88.

Network Time Protocol (NTP) Server – Time synchronized for Kerberos on port 123.

Domain Name Service (DNS) – Host (A), Pointer (PTR), Service Location (SRV) records on port 53.

Chapter 2 • Planning a deployment 25

Page 28: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Depending on the specific components you deploy and operations performed, you might need to open additional ports. The following table summarizes the ports used for Centrify software.

This port

Is used for Centrify software component

22 Encrypted TCP communication for OpenSSH connections

Deployment Manager for secure shell connections on remote clients.

You can change the default port for secure shell connections by setting an option in Deployment Manager. For more information about setting this option, see the Deployment Manager User’s Guide.

23 TCP communication for Telnet connections

Deployment Manager for telnet connections on remote clients if you cannot use secure shell (ssh).

By default, telnet connections are not allowed because passwords are transferred over the network as plain text. If you configure Deployment Manager to allow telnet connections, this port is used if an attempt to use a secure shell connection fails.

53 TCP/UDP communication Clients use the Active Directory DNS server for DNS lookup requests.

88 Encrypted UDP communication

Kerberos ticket validation and authentication, agents, Centrify PuTTY

123 UDP communication for simple network time protocol (NTP)

Keeps time synchronized between clients and Active Directory for Kerberos ticketing.

389 Encrypted TCP/UDP communication

Active Directory authentication and client LDAP service.

443 Cloud proxy server to Centrify cloud service

Centrify for mobile device management.

Auditing Administrator’s Guide 26

Page 29: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Identify an Active Directory site or subnets

Depending on the size and distribution of your Active Directory site, an audit store might cover an entire site or specific subnet segments. If you have a large, widely distributed site, you should consider network connectivity and latency issues in determining which subnets each audit store should serve. In addition, you should always place collectors in the same site as the agents from which they receive data. Collectors and agents must always be in the same Active Directory forest. If possible, you should put collectors and agents in the same domain.

445 Encrypted TCP/UDP communication for delivery of group policies

The adclient and adgpupdate use Samba (SMB) and Windows file sharing to download and update group policies, if applicable.

464 Encrypted TCP/UDP communication for Kerberos password changes

Kerberos ticket validation and authentication for agents, Centrify PuTTY, adpasswd, and passwd.

500 Internet Key Exchange (IKE) for UDP

Centrify Isolation and Encryption Service to protect data-in-motion

1433 Encrypted TCP communication for the collector connection to Microsoft SQL Server

collector service sends audited activity to the database

3268 Encrypted TCP communication Active Directory authentication and LDAP global catalog updates.

4500 Internet Key Exchange (IKE) for NAT-T

Centrify Isolation and Encryption Service to protect data-in-motion

5063 Encrypted TCP/RPC communication for the agent connection to collectors

The auditing service records user activity on an audited computer.

none ICMP (ping) connections Deployment Manager to determine whether if a remote computer is reachable.

This port

Is used for Centrify software component

Chapter 2 • Planning a deployment 27

Page 30: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Note If you deploy agents in a perimeter network, such as a demilitarized zone (DMZ), that is separated from your main network by a firewall, put the collectors in the same Active Directory domain as the audited computers. The collectors can communicate with the audit store database through a firewall.

Determine how many collectors and audit stores to install

Although you can add collectors and audit stores to your audit installation after the initial deployment, you might want to calculate how many you will need before you begin deploying components. You should always have at least two collectors to provide redundancy. As you increase the number of agents deployed, you should consider adding collectors.

Estimate the number of agents and sessions audited

If you plan to use more than the minimum number of collectors, the most important factor to consider is the number of concurrent sessions you expect to monitor on audited computers. The number of concurrent sessions represents the number of agents that are actively capturing user sessions in a site at the same time.

Guidelines for Linux and UNIX computers

You can use the following guidelines as a starting point and adjust after you have observed how much audit data you are collecting and storing for Linux and UNIX computers:

Number of concurrent sessions

Recommended number of collectors

Recommended number of audit stores

500 (or less) agents 2 1

up to 1000 agents 2 1

more than 1000 agents

2 for every 500 agents 1 for every 1000 agents

Auditing Administrator’s Guide 28

Page 31: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Guidelines for Windows computers or mixed environments

You can use the following guidelines as a starting point and adjust after you have observed how much audit data you are collecting and storing for Windows computers:

If you auditing Linux, UNIX, and Windows computers, use the numbers of collectors and audit stores recommended for Windows agents unless you have significantly fewer Windows agents.

Determine the recommended hardware configuration

The hardware requirements for collectors and audit store servers depend on the size of the installation and where the components are installed on the network. For example, the requirements for a computer that hosts the collector service are determined by the number of audited computers the collector supports, the level of user activity being captured and transferred, and the speed of the network connection between the agents and the collector and between the collector and its audit store.

Number of concurrent sessions

Recommended number of collectors

Recommended number of audit stores

100 (or less) agents 2 1

more than 100 agents 2 for every 100 agents 1 for every 100 agents

Chapter 2 • Planning a deployment 29

Page 32: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install collectors and audit stores

Guidelines for Linux and UNIX computers

You can use the following guidelines as the recommended hardware configuration for the computers you use for collectors and audit store servers when auditing Linux and UNIX computers:

Guidelines for Windows computers

You can use the following guidelines as the recommended hardware configuration for the computers you use as collectors and audit store servers when auditing Windows computers:

Computer used for

Number of concurrent sessions

CPU cores

CPU speed

Memory

Collectors Up to 250 active UNIX agents

2 2.33 GHz 8 GB

250 to 500 active UNIX agents

4 2.33 GHz 16 GB

Audit store Up to 250 active UNIX agents

2 2.33 GHz 8 GB

250 to 500 active UNIX agents

4 2.33 GHz 16 GB

500 to 1000 active UNIX agents

4 2.33 GHz 32 GB

Computer used for

Number of concurrent sessions

CPU cores

CPU speed

Memory

Collectors Up to 100 active Windows agents

2 2.33 GHz 8 GB

Audit store Up to 200 active Windows agents

2 2.33 GHz 8 GB

200 to 500 active Windows agents

4 2.33 GHz 32 GB

Auditing Administrator’s Guide 30

Page 33: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install agents

Guidelines for storage

Because auditing collectors send captured user sessions to the active SQL Server database, you should optimize SQL Server storage for fast data logging, if possible. For the active database, you get the most benefit from improvements to disk write performance. Read performance is secondary. Fibre Attached Storage (FAS) and Storage Area Network (SAN) solutions can provide 2 to 10 times better performance than Direct Attached Storage (DAS), but at a higher cost. For attached databases that are only used to store information for queries, you can use lower-cost storage options.

Guidelines for disk layout

The following table outlines the recommended disk arrays:

The size of disk needed depends on the number, length, and types of sessions recorded each day, the selected recovery model, and your data retention policies. For more information about managing audit store databases, see “Managing audit store databases” on page 104.

Decide where to install agentsThe Centrify agent must be installed on all of the computers you want to audit. Therefore, as part of your planning process, you should decide whether you want to audit every computer on the network or

Application Disk configuration

Use the disk for

Operating system C: RAID 1 Operating system files, page file, and SQL Server binaries.

Microsoft SQL Server

D: RAID 10 (1+0)

Audit store database.

E: RAID 10 (1+0) Audit store database log files.

F: RAID 1 or 10 (1+0)

Temporary database space (tempdb) for large queries for reports.

G: RAID 1 Database dump files.

Chapter 2 • Planning a deployment 31

Page 34: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Decide where to install consoles

specific computers, such as the computers used as servers or used to run administrative software.

Before installing the Windows agent, verify the following:

The computer is joined to Active Directory.

The computer has .NET 4.5.2 or later installed.

The computer has Windows Installer version 3.1 or newer.

Agents can communicate with a collector only if the agents and collector are in the same Active Directory forest.

Decide where to install consolesYou can install and run the Audit Manager console and the Audit Analyzer console on the same computer or on different computers. The computers where you install the consoles must be joined to the Active Directory domain and be able to access the management database that serves the installation.

You can also use the Audit Analyzer console to run queries from any additional computers with network access to the management database. Therefore, you should decide where it would be convenient to have this capability.

Make sure you have a supported edition of SQL Server

The current release of the Centrify Auditing and Monitoring Service supports 64-bit versions of the following SQL Server editions:

SQL Server 2008 Express with Advanced Services

SQL Server 2008

SQL Server 2008 R2 Express with Advanced Services (Service Pack 2 or higher recommended)

SQL Server 2008 R2 (Service Pack 2 or higher recommended)

SQL Server 2012 Express with Advanced Services

Auditing Administrator’s Guide 32

Page 35: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Check SQL Server logins for auditing

SQL Server 2012

SQL Server 2014 Express with Advanced Services

SQL Server 2014

SQL Server 2016

Note SQL Server 2008 and 2008 R2 are not compatible with Windows 10

Check SQL Server logins for auditingAn audit installation requires at least two Microsoft SQL Server databases: one for the management database and at least one for the first audit store database. To successfully connect to these databases, you must ensure that the appropriate users and computers have permission to read or to read and write for the databases that store audit-related information.

The simplest way to manage SQL logins for auditors and administrators is to do the following:

Ensure you have a SQL login account for the NT Authority\System built-in account.

Add the NT Authority\System account to system administrator role.

Use Audit Manager to grant Manage SQL Logins permissions to the Active Directory users and groups that require them.

If you use Audit Manager to manage SQL logins, you can use Active Directory membership to automatically add and remove the permissions required for auditing activity. There is no requirement to use the SQL Server Management Studio to manage logins or permissions. Since it is recommended that you have a dedicated SQL Server instance for auditing, giving the NT Authority\System account a SQL login and system administrator role is an acceptable solution for most organizations.

Chapter 2 • Planning a deployment 33

Page 36: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determining storage requirements for auditing

Create security groups for auditing

Depending on whether you configure Microsoft SQL Server to use Windows only authentication or Windows or SQL Server authentication, your SQL Server login credentials might be a Windows account or a SQL Server login account that is not associated with a Windows account.

To facilitate communication and the management of SQL logins, you can create Active Directory security groups for the following users and computers:

Centrify-Admins for the user accounts that perform administrative tasks using Audit Manager.

Centrify-Auditors for the user accounts that use Audit Analyzer.

Centrify-TrustedCollectors for the computers accounts that host the collector service.

If you create these Active Directory security groups, you can then use Audit Manager to grant Manage SQL Login permissions for each group to allow its members to connect to the appropriate SQL Server database. Creating Active Directory security groups with SQL Server logins enables you to manage access to the databases required for auditing through Active Directory group membership without the help of the database administrator.

Any time you want to add an administrator, auditor, or collector computer to the installation, you simply add that user account or computer object to the appropriate Active Directory group. If an administrator or auditor leaves or if you want to stop using the collector on a particular computer, you can remove that user or computer from its Active Directory security group to prevent it from accessing the database.

Determining storage requirements for auditingThere are two important policy decisions your organization must make to determine how much disk space you need for storing audit data and how frequently you should plan to rotate the active database. Early on in the deployment, your organization should consider the following policy decisions:

Auditing Administrator’s Guide 34

Page 37: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determining storage requirements for auditing

What is your rotation policy?

To answer this question, you should decide the period of time audited sessions should be available in the active and attached database for auditors to review using the Audit Analyzer console. For example, you might decide that you want to be able to query audited activity for a minimum of 90 days. Alternatively, you might want to define a rotation policy that is based on the size of the database, so that the active database is not allowed to exceed a specific size. For example, you might decide that the database should not exceed 4GB to optimize performance for archiving.

What is your retention policy?

To answer this question, you should decide the period of time to keep audited data available in attached databases and the maximum period of time to keep archived audit data available before purging data that’s no longer needed.

To illustrate how these policies affect database management, consider a rotation policy based on a monthly schedule. In this example, an organization decides that audit data must be available for querying for a minimum of 90 days. On the first of each month, a new active database is brought online and the previous 3 months remain available as attached databases to support querying 90 to 120 days of audit

data.

In this model, there are four databases online at the same time. This example organization has also decided on a two-stage retention policy. In the first stage, older databases are detached from Audit Analyzer, but remain stored on the SQL Server instance for up to one year. The

Chapter 2 • Planning a deployment 35

Page 38: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

What’s involved in the deployment process

detached databases provide up to a year of audit history and can be reattached, if that data is needed. In the second stage of the retention policy, the organization archives the audit store databases for up to 3 years. After three years, the oldest data is permanently purged.

Depending on your requirements, you might use a similar retention policy or have different policies based on the session activity you are capturing. For example, you might keep sessions that capture normal user activity for three years, but keep sessions that capture SOX compliance for ten years.

To project your storage requirements, you will need additional information that is specific to your organization, including the number of computers you plan to audit, the number of sessions that are active on audited computers, and whether you record all activity using video capture or only summaries of user activity. To collect this information, you should monitor a pilot deployment. You can then use the information from the pilot deployment as described in “Estimating database requirements based on the data you collect” on page 107 to estimate your storage requirements based on how much audit data you are generating. The decisions you make for the rotation and retention policies will help you further refine those estimations as you expand the deployment.

Note If you define a rotation policy similar to this example, you can automate the monthly database rotation using Centrify application programming interfaces or using scheduled SQL Server jobs or scripts that perform database maintenance operations. For more information, see the Centrify Infrastructure Services Database Management Guide.

What’s involved in the deployment processMost of the planning in this chapter has focused on designing the auditing infrastructure and deciding where to install components. The following illustration provides a visual summary of the complete deployment process and highlights the keys to success. The sections after the flowchart provide additional details about what’s involved in each phase or the decisions you will need to make, such as who should

Auditing Administrator’s Guide 36

Page 39: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

What’s involved in the deployment process

be part of the deployment team, where to install the software, and who has permission to do what.

Plan

During the first phase of the deployment, you collect and analyze details about your organization’s requirements and goals. You can then also make preliminary decisions about sizing, network communication, and where to install components.

Here are the key steps involved:

Identify the goals of the deployment.

Chapter 2 • Planning a deployment 37

Page 40: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

What’s involved in the deployment process

Is auditing important for specific computers?

Is auditing important for computers used to perform administrative tasks?

Is auditing important for computers that host specific applications or sensitive information?

Should auditing be required for users in specific groups or with specific roles?

Assemble a deployment team with Active Directory, UNIX, and other expertise, including at least one Microsoft SQL Server database administrator.

Provide basic training on Centrify architecture, concepts, and terminology.

Analyze the existing environment to identify target computers where you plan to install Centrify auditing infrastructure components.

Plan for permissions and the appropriate separation of duties for your organization.

Review network connections, port requirements, firewall configuration.

Identify computers for Audit Manager and Audit Analyzer consoles.

Identify computers to be used as collectors, audit stores, and the management Database.

Verify that you have reliable, high-speed network connections between components that collect and transfer audit data and sufficient disk storage for the first audit store database.

Identify the initial target group of computers to be audited. Define and document your data archiving and data retention

policies.

Prepare

After you have analyzed the environment, you should prepare the Active Directory groups to use. You can then install administrative consoles and the auditing infrastructure.

Auditing Administrator’s Guide 38

Page 41: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

What’s involved in the deployment process

Here are the key steps involved:

(Optional) Create the additional Active Directory security groups for your organization.

Groups can simplify permission management and the separation-of-duties security model.

Install Audit Manager and Audit Analyzer on at least one administrative Windows computer.

Create a new audit installation and a management database on one computer.

Create an audit store and audit store database on at least one computer.

Install a collector on at least two computers.

Deploy

After you have prepared Active Directory, installed administrative consoles on at least one computer, and created at least one installation, you are ready to deploy agents on the computers to be audited.

Here are the key steps involved:

Install the agent on the computers you want to audit. Join the appropriate domains and zones. Prepare a Group Policy Object for deploying agents remotely using a

group policy. Assign the appropriate permissions to the users and groups who

should have access to audit data.

Validate

After you have deployed agents on target computers, you should test and verify operations before deploying on additional computers.

Here are the key steps involved:

Log on locally to a target computer using an Active Directory user account and password to verify Active Directory authentication.

Open Audit Analyzer and query for your user session.

Chapter 2 • Planning a deployment 39

Page 42: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

What’s involved in the deployment process

Manage

After you have tested and verified auditing operations, you are ready to begin managing your audit installation.

Here are the key steps involved:

Secure the installation. Add auditor roles and assign permissions to the appropriate users

and groups. Create new databases and rotate the active database. Archive and delete old audit data.

Auditing Administrator’s Guide 40

Page 43: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 3

Installing Centrify Auditing and Monitoring Service

This chapter describes how to install Centrify Auditing and Monitoring Service in a production environment. In production environments, you should use a different computer for each component. For example, you should install the collector on its own computer separate from the computer used for the audit store database, and on a separate computer from the audit management database.

To create a simpler installation with all components on the same computer for evaluation purposes, see the Evaluation Guide for Linux and UNIX. For evaluation of auditing features in a Windows-only environment, see the Evaluation Guide for Windows.

Installation previewAs a preview of what’s involved in the installation process, the following steps summarize what you need to do and the information you should have on hand for a successful deployment of Centrify software.

To prepare for deployment:

1 Analyze your network topology to determine where to install components and services and any hardware or software updates required.

For a review of the decisions to make and recommended hardware configuration, see “Planning a deployment” on page 22.

2 Create a list of the computers where you plan to install different components.

For example, list the computers where you plan to install agents, collectors, audit store databases, and consoles.

For a review of the requirements associated with each component, see “Planning a deployment” on page 22.

3 Determine the scope of the audit installation.

41

Page 44: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Installation preview

The most common deployment scenario is a single installation for an Active Directory site, but you can have more than one installation, if needed, and use subnets to limit the scope of the installation.

For a review of what constitutes an installation, see “Deploying auditing components in an audit installation” on page 17 and “Decide on the scope of the installation” on page 22.

4 Create Active Directory security groups for managing the permissions that are required for accessing the databases that store audit-related information.

For a review of the Active Directory security groups to create, see “Check SQL Server logins for auditing” on page 33.

5 Install Microsoft SQL Server.

If you are not a database administrator in your organization, you should submit a service request or contact an administrator who has permission to create databases.

For more information about preparing a SQL Server database engine for auditing, see “Install and configure Microsoft SQL Server for auditing” on page 43.

6 Install the Audit Manager and Audit Analyzer consoles.

For more information about installing the consoles, see “Install the Audit Manager and Audit Analyzer consoles” on page 48.

7 Open Audit Manager to create a new installation.

For more information about using Audit Manager to create a new installation and audit store, see “Create a new installation” on page 49.

8 Install the audit collector service on at least two Windows computers.

You can add collectors to the installation at any time. For more information about installing and configuring collectors, see “Install the audit collectors” on page 59.

9 Install a Centrify agent on each Windows, Linux, or UNIX computer you want to audit.

Auditing Administrator’s Guide 42

Page 45: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install and configure Microsoft SQL Server for auditing

For more information about installing Centrify agents, see “Install Windows agents” on page 62 and “Install UNIX agents” on page 83.

10 Install additional Audit Manager or Audit Analyzer consoles on any Windows computer that you want to use to manage the installation or query and play back session data.

After the initial deployment, you can add new agents, collectors, audit stores, and audit store databases to the installation or create additional installations.

Install and configure Microsoft SQL Server for auditing

If you want to audit user activity on Windows, you must have at least one Microsoft SQL Server database instance for the audit management database and audit store databases. Centrify recommends that you use a dedicated instance of SQL Server for the audit management database. A dedicated SQL Server instance is an instance that does not share resources with other applications. The audit store databases can use the same dedicated instance of SQL Server or their own dedicated instances.

There are three database deployment scenarios for your audit installation:

Evaluation—You can install Microsoft SQL Server Express with Advanced features directly from the configuration wizard or by running the SQLEXPRADV_x86_ENU.exe setup program to create a new Microsoft SQL Server Express database instance for testing. However, if you are auditing a production environment, you should not use Microsoft SQL Server Express. If you install Microsoft SQL Server Express for an evaluation, the configuration wizard will also install the .NET Framework, version 3.5 SP1, which is required for the version of Microsoft SQL Server Express packaged with Centrify Auditing and Monitoring Service.

Manual installation with system administrator privileges—Install a Microsoft SQL Server database instance for which you are a system administrator or have been added to the system administrator role.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 43

Page 46: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install and configure Microsoft SQL Server for auditing

Manual installation without system administrator privileges—Have the database administrator (DBA) install an instance of Microsoft SQL Server and provide you with system administrator credentials or information about the database instance so that you can create the management database and audit store databases.

Downloading and installing SQL Server manually

You can use an existing instance of Microsoft SQL Server or install a new instance. You can install Microsoft SQL Server directly from the Centrify ISO or ZIP, or download it from the Microsoft web site. In selecting a version of SQL Server to download, you should be sure it includes Advanced Services. Advanced Services are required to support querying using SQL Server full-text search.

After downloading an appropriate software package, run the setup program using your Active Directory domain account and follow the instructions displayed to complete the installation of the Microsoft SQL Server instance.

When selecting the components to install in the setup program, expand the Database Services and select Full Text Search as a feature to be installed. For the authentication mode, select Windows authentication if all connections between auditing components will be in the same forest. If any communication will be outside of the forest, use Mixed Mode authentication and select the option to add the current user to the SQL Server Administrator role.

Note Centrify does not recommend running SQL Server under a high privilege account such as a LocalSystem account.

Configuring SQL Server to prepare for auditing

After you install the SQL Server database engine and management tools, you should configure the SQL Server instance for auditing. For example, depending on the version of SQL Server you install, you might need to manually enable full-text search.

To prepare a Microsoft SQL Server database instance for storing audit data:

Auditing Administrator’s Guide 44

Page 47: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install and configure Microsoft SQL Server for auditing

Use SQL Server Surface Area Configuration for Services and Connections to check the status and start the database engine, full-text search, and SQL Server Browser services.

Use SQL Server Surface Area Configuration for Services and Connections or SQL Server Configuration Manager to enable remote connections for TCP/IP.

Verify whether SQL Native Client Configuration Client Protocol is using the default TCP port 1433 for network communications. If you use a different port, you should note the port number because you will need to specify it in the server name when you create the management and audit store databases.

Use SQL Server Configuration Manager to restart the SQL Server and SQL Server Browser services.

Configuring Amazon RDS for SQL Server for auditing

If you want to use an instance of Amazon RDS for SQL Server for audit store databases you need to do the following configurations:

After you set up your Amazon RDS for SQL Server, join the RDS SQL server to AWS Microsoft Active Directory.

Enable these DB Parameter Group settings on RDS SQL Server:

clr enabled

show advanced options

You can use the AWS Management Console, API, or the AWS command line interface to enable these settings.

For more details, see http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithParamGroups.html.

Set up a one-way or two-way forest trust between the AWS Microsoft Active Directory and your on-premise Active Directory forest so that users of your on-premise Active Directory forest can access resources in the AWS Microsoft Active Directory.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 45

Page 48: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install and configure Microsoft SQL Server for auditing

Amazon RDS for SQL Server required permissions

The permissions for Amazon RDS for SQL Server vary a little from the permissions for local or network instances of SQL Server. This section covers the Amazon RDS for SQL Server permission required or granted for each auditing component.

Permissions to the audit store database stored procedures service account

The stored procedures service account (in other words, the ‘execute as’ account) no longer requires the sysadmin server role permission if the audit store database is on Amazon RDS for SQL Server.

The service account requires only the db_owner database role permission and the account will be added to be member of db_owner database role by Add Audit Store Database wizard.

Note You do not need to grant the permissions manually. The Audit Manager console, Powershell cmdlet, or SDK grants the permissions to the service account.

Collector account permissions for audit store databases on Amazon RDS for SQL Server

The collector account requires the following server level permissions on the Amazon RDS for SQL Server:

'View Any Definition'' server level permission

'View Server State' server level permission

The collector account requires the following database level permissions on the audit store database:

A member of the 'collector' database role

Note You do not need to grant the permissions manually. The Audit Manager console, Powershell cmdlet, SDK, or the Collector Configuration wizard grants the permissions to the collector account.

Management Database Account permissions for audit store databases on Amazon RDS for SQL Server

Auditing Administrator’s Guide 46

Page 49: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install and configure Microsoft SQL Server for auditing

The management database account requires the following server level permissions on the RDS SQL server:

'Alter Trace' server level permission

'Alter Any Login' server level permission

Grant permission of 'Alter Any Login' server level permission

Grant permission of 'View Any Definition' server level permission

Grant permission of 'View Server State' server level permission

The management database account requires the following database level permissions on the audit store database:

A member of 'managementdb' database role

Note You do not need to grant the permissions manually. The Audit Manager console, Powershell cmdlet, or SDK grants the permissions to the management database account.

Permissions to create the audit store database on Amazon RDS for SQL Server

In order to create an audit store database on Amazon RDS for SQL Server, you must have the following permissions:

'Create Any Database' server level permission to create the database on the server

'Alter Any Login' server level permission to create the login for the management database account and the collector account

Alter Any Login' server level permission to grant the 'Alter Any Login' permission to the management database account

'Alter Trace' server level permission to grant the 'Alter Trace' permission to the management database account

'View Any Definition' server level permission to grant the 'View Any Definition' (with grant) permission to the management database account and also to grant the 'View Any Definition' permission to the collector account

Grant permission of 'View Server State' server level permission to grant the 'View Server State' (with grant) permission to the

Chapter 3 • Installing Centrify Auditing and Monitoring Service 47

Page 50: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install the Audit Manager and Audit Analyzer consoles

management database account and also to grant the 'View Server State' permission to the collector account

Permissions to upgrade the audit store database on Amazon RDS for SQL Server

The required permission to upgrade the audit store database on Amazon RDS for SQL Server is the ‘db owner’ permission on the database. No server level permissions are required

Install the Audit Manager and Audit Analyzer consoles

You can install Audit Manager and Audit Analyzer on the same computer or on different computers. The computers where you install the consoles must be joined to the Active Directory domain and be able to access the management database.

In most cases, the consoles are installed together on at least one computer.

To install Audit Manager and Audit Analyzer on the same computer:

1 Log on using an Active Directory domain account.

2 Open the ISO file.

If you created a physical CD from the ISO file that you downloaded, the Getting Started page is displayed automatically. If the page is not displayed, open the autorun.exe file to start the installation.

3 On the Getting Started page, click Audit & Monitor to start the setup program for auditing components.

4 At the Welcome page, click Next.

5 Review the terms of the license agreement, click I accept the terms in the license agreement, then click Next.

6 Select Centrify Administration to install both Audit Manager and Audit Analyzer, then click Next.

Auditing Administrator’s Guide 48

Page 51: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

In the rare case where the administrator should not have access to the Audit Analyzer, select Audit Manager, then click Next.

After you install Audit Manager, you are prompted to create a new installation. If you want to create the installation at a later time, you can run the setup program again to create a new installation.

Create a new installationBefore you can begin auditing, you must create at least one audit installation and a management database. Creating the management database, however, requires SQL Server system administrator privileges on the computer that hosts the SQL Server instance. If possible, you should have a database administrator add your Active Directory domain account to the SQL Server system administrators role.

If you have not been added to the system administrators role, you should contact a database administrator to assist you. For more information about creating a new installation when you don’t have system administrator privileges, see “How to create an installation without system administrator privileges” on page 52.

To create a new installation and management database as a system administrator:

1 Log on using an Active Directory account with permission to install software on the local computer.

2 Open Audit Manager.

Note If you haven’t configured an audit installation yet, the New Installation wizard opens automatically.

3 If this isn’t your first audit installation: in Audit Manager, right-click Centrify Audit Manager and select New Installation to open the New Installation wizard.

4 Enter a name for the new installation, then click Next.

Tip Name the installation to reflect its administrative scope. For example, if you are using one installation for your entire organization, you might include the organization name and All or Global in the installation name, such as AcmeAll. If you plan to use

Chapter 3 • Installing Centrify Auditing and Monitoring Service 49

Page 52: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

separate installations for different regions or divisions, you might include that information in the name, for example AcmeBrazil for a regional installation or AcmeFinance for an installation that audits computers in the Finance department.

5 Select the option to create a new management database and verify the SQL Server computer name, instance name, and database name are correct.

If the server does not use the default TCP port (1433), you must provide the server and instance names separated by a backslash, then type a comma and the appropriate port number. For example, if the server name is ACME, the instance name is BOSTON, and the port number is 1234, the server name would be ACME\BOSTON,1234.

If you’re connecting to a SQL Server availability group listener, click Options (next to the Server Name) and enter the following connection string parameters:MultiSubnetFailover=Yes

Click Next to continue.

6 Select Use the default NT AUTHORITY\SYSTEM account to use the internal account or select a specific SQL login account with sufficient privileges, then click Next.

A SQL login account is required to run the stored procedures that read and write information to the management database. The account must a member of the system administrator (sa) fixed server role on the selected database server.

7 Type the license key you received, then click Add or click Import to import the keys directly from a file, then click Next.

8 Accept the default location or click Browse to select a different Active Directory location for publishing installation information, then click Next.

You must have the Active Directory permission to Create serviceConnectionPoint objects on the container or organizational unit you select for publishing installation information.

9 Select the installation-wide auditing options you want to enable, then click Next.

Auditing Administrator’s Guide 50

Page 53: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

Select Enable video capture recording of user activity if you want to capture shell or desktop activity on computers when users are audited, then click Next.

Selecting this option enables you to review everything displayed during an audited user session, but will increase the audit store database storage requirements for the installation. You can deselect this option if you are only interested in a summary of user activity in the form of audit trail events. Audit trail events are recorded when users log on, open applications, and select and use role assignments with elevated rights.

Select Do not allow any users to review their own sessions to prevent all users from updating the review status for their own sessions or adding comments to their own sessions.

Select Do not allow any users to delete their own sessions to prevent all users from deleting their own sessions.

If you set either of the installation-wide policies disallowing user activity, the policy takes precedence over any rights provided by a user’s audit role.

10 Review details about the installation and management database, then click Next.

If you have SQL Server system administrator (sa) privileges and can connect to the SQL Server instance, the wizard automatically creates the management database.

11 Select the Launch Add Audit Store Wizard option if you want to start the Add Audit Store wizard, then click Finish.

If you want to create the first audit store database on a different SQL Server instance, you should deselect the Launch Add Audit Store Wizard option and click Finish.

For more information about adding the first audit store database, see “Create the first audit store” on page 54.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 51

Page 54: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

How to create an installation without system administrator privileges

If you do not have the appropriate permission to create SQL Server databases, you cannot use the New Installation wizard to create the management database without the assistance of a database administrator.

If you do not have system administrator privileges, the wizard prompts you to specify another set of credentials or generate SQL scripts to give to a database administrator. For example:

If you don’t have a database administrator immediately available who can enter the credentials for you, you cannot continue with the installation.

To create an installation when you don’t have system administrator privileges:

1 Select the option to generate the SQL scripts, then click Next.

2 Select the folder location for the scripts, then click Next.

3 Review details about the installation and management database you want created, then click Next.

The wizard generates two scripts: Script1 prepares the SQL Server instance for the management database and Script2 creates the database.

4 Click Finish to exit the New Installation wizard.

Auditing Administrator’s Guide 52

Page 55: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

5 Send the scripts to a database administrator with a service or change-control request.

Note You should notify the database administrator that the scripts must be run in the proper sequence and not modified in any way. Changes to the scripts could render the database unusable.

6 After the database administrator creates the database using the scripts, open the Audit Manager console to run the New Installation wizard again.

7 Type the name of the installation, then click Next.

8 Select Use an existing database and verify the database server and instance name, then click the Database name list to browse for the database name that the database administrator created for you.

If the server does not use the default TCP port, specify the port number as part of the server name. For example, if the port number is 1234, the server name would be similar to ACME\BOSTON,1234.

9 Select the database name from the list of available databases, click OK, then click Next.

You should only select an existing database if the database was created using scripts provided by Centrify.

10 Select Use the default NT AUTHORITY\SYSTEM account to use the internal account or select a specific SQL login account with sufficient privileges, then click Next.

A SQL login account is required to run the stored procedures that read and write information to the management database. The account must a member of the system administrator (sa) fixed server role on the selected database server.

11 Type a license key or import licenses from a file, then click Next.

12 Review details about the management database to be installed, then click Next.

13 Select the Launch Add Audit Store Wizard option if you want to start the Add Audit Store wizard, then click Finish.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 53

Page 56: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

Create the first audit store

If you selected the Launch Add Audit Store Wizard check box at the end of the New Installation Wizard, the Add Audit Store Wizard opens automatically. You can also open the wizard at any time by right-clicking the Audit Stores node in the Audit Manager console and choosing Add Audit Store.

To create the first audit store:

1 Type a display name for the audit store, then click Next.

Tip If your plan specifies multiple audit stores, use the name to reflect the sites or subnets serviced by this audit store. Note that an audit store is actually a record in the management database. It is not a separate process running on any computer. You use a separate wizard to create the databases for an audit store.

2 Click Add Site or Add Subnet to specify the sites or subnets in this audit store.

If you select Add Site, you are prompted to select an Active Directory site.

If you select Add Subnet, you are prompted to type the network address and subnet mask.

After you make a selection or type the address, click OK. You can then add more sites or subnets to the audit store. When you are finished adding sites or subnets, click Next to continue.

The computer you use to host the audit store database should be no more than one gateway or router away from the computers being audited. If your Active Directory sites are too broad, you can use standard network subnets to limit the scope of the audit store.

3 Review information about the audit store display name and sites or subnets, then click Next.

4 Select the Launch Add Audit Store Database Wizard option if you want to create the first audit store database, then click Finish.

Auditing Administrator’s Guide 54

Page 57: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

Create the first audit store database

If you selected the Launch Add Audit Store Database Wizard check box at the end of the Launch Add Audit Store Wizard, the Add Audit Store Database Wizard opens automatically. You can also open the wizard at any time from the Audit Manager console by expanding an audit store, right-clicking the Databases node, and choosing Add Audit Store Database.

To create the first audit store database:

1 Type a display name for the audit store database, then click Next.

The default name is based on the name of the audit store and the date the database is created.

2 Select the option to create a new database and verify that the SQL Server computer name, instance name, and database name are correct.

The default database name is the same as the display name. You can change the database name to be different from the display name, if you want to use another name.

If the server does not use the default TCP port, specify the port number as part of the server name. For example, if the port number is 1234, the server name would be similar to ACME\BOSTON,1234.

If the database is an Amazon RDS SQL Server:

a Select the This is an Amazon RDS SQL Server option.

b In the Server Name field, enter the RDS SQL Server database instance endpoint name used for Kerberos authentication.

For example, if the database host name is northwest1 and the domain name is sales.acme.com, then the endpoint name would be northwest1.sales.acme.com.

Click Options to enter additional connection string parameters or to enable data integrity checking.

If you’re connecting to a SQL Server availability group listener, click Options (next to the Server Name) and enter the following connection string parameters:

MultiSubnetFailover=Yes

Chapter 3 • Installing Centrify Auditing and Monitoring Service 55

Page 58: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

You can enable or disable data integrity checking once, when you create the audit store database. To change the state, you must rotate to a new audit store database.

When you create your audit store database, you have the option to enable data integrity checking. Data integrity checking provides the ability to detect if auditing data has been tampered. For example, data integrity checking can detect if a user who has write privileges over the Audit Store database directly manipulates the audited session data by making a direct connection to the Microsoft SQL Server database. Data integrity checking cannot detect tampering if a database administrator deletes an entire session or database.

Click Next to continue.

3 Because this is the first audit store database, you also want to make it the active database. This option is selected by default. If you are creating the database for future use and don’t want to use it immediately, you can deselect the Set as active database option. The option to create a new database is also selected by default.

Click Next to continue.

4 Specify the stored procedures services account:

Select Use the default NT AUTHORITY\SYSTEM account to use the internal account

Or, select Specify a SQL Login account and enter a specific SQL login account with sufficient privileges.

A SQL Server login account is required to run the stored procedures that read and write information to the management database.

For local or network databases, the account must a member of the system administrator (sa) fixed server role on the selected database server.

If the database is an Amazon RDS for SQL Server, the account you specify will be added as a member of the db_owner fixed database role in Amazon RDS for SQL Server.

Click Next to continue.

Auditing Administrator’s Guide 56

Page 59: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

5 Review details about the audit store database, then click Next.

If you have the correct privileges and can connect to the SQL Server instance, the wizard automatically creates the audit store database.

Connecting to SQL Server on a remote computer

To create an audit store database on a remote computer, there must be a one-way or two-way trust between the domain of the computer on which you are running the Add Audit Database wizard and the domain of the computer hosting SQL Server. The Active Directory user account that you used to log on to the computer where the Audit Manager is installed must be in a domain trusted by the computer running SQL Server. If there is no trust relationship, you must log on using an account in the same domain as the computer running SQL Server. If you are accessing the computer running SQL Server remotely, you can use the Run As command to change your credentials on the computer from which you are running the wizard.

Verify network connectivity

The computer hosting the SQL Server database for the active audit store server must be online and available from the Audit Manager console and from the clients in the Active Directory site or the subnet segments you have defined for the audit store. You should verify that there are no network connectivity issues between the computers that will host collectors and those hosting the SQL Server databases.

How to create the database without system administrator privileges

If you do not have system administrator privileges, the wizard prompts you to specify another set of credentials or generate SQL scripts to give to a database administrator. If you don’t have database administrator credentials or a database administrator immediately available who can enter the credentials for you, you should generate the scripts, then follow the prompts displayed to exit the wizard.

To add the database to the audit store after you have generated the scripts:

1 Send the scripts to a database administrator with a service or change-control request.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 57

Page 60: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Create a new installation

Note You should notify the database administrator that the scripts must be run in the proper sequence and not modified in any way. Changes to the scripts could render the database unusable.

2 After the database administrator creates the database using the scripts, open the Audit Manager console.

3 Expand the installation node, then expand Audit Stores and the specific audit store you for which you want a new database.

4 Select Databases, right-click, then click Add Audit Store Database.

5 Type a display name for the audit store database, then click Next.

6 Enter the database server name:

The default database name is the same as the display name. You can change the database name to be different from the display name, if you want to use another name.

If the server does not use the default TCP port, specify the port number as part of the server name. For example, if the port number is 1234, the server name would be similar to ACME\BOSTON,1234.

If the database is an Amazon RDS SQL Server:

a Select the This is an Amazon RDS SQL Server option.

b In the Server Name field, enter the RDS SQL Server database instance endpoint name used for Kerberos authentication.

For example, if the database host name is northwest1 and the domain name is sales.acme.com, then the endpoint name would be northwest1.sales.acme.com.

Click Options to enter additional connection string parameters or to enable data integrity checking.

If you’re connecting to a SQL Server availability group listener, click Options (next to the Server Name) and enter the following connection string parameters:

MultiSubnetFailover=Yes

You can enable or disable data integrity checking once, when you create the audit store database. To change the state, you must rotate to a new audit store database.

Auditing Administrator’s Guide 58

Page 61: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install the audit collectors

When you create your audit store database, you have the option to enable data integrity checking. Data integrity checking provides the ability to detect if auditing data has been tampered. For example, data integrity checking can detect if a user who has write privileges over the Audit Store database directly manipulates the audited session data by making a direct connection to the Microsoft SQL Server database. Data integrity checking cannot detect tampering if a database administrator deletes an entire session or database.

7 Select Use an existing database and select the database that the database administrator created for you.

Because this is the first audit store database, you also want to make it the active database. This option is selected by default. If you are creating the database for future use and don’t want to use it immediately, you can deselect the Set as active database option.

If the server does not use the default TCP port, specify the port number as part of the server name. For example, if the port number is 1234, the server name would be similar to ACME\BOSTON,1234.

The installation, management database, and first audit store database are now ready to start receiving user session activity. Next, you should install the collectors and, finally, the agents to complete the deployment of the auditing infrastructure.

Install the audit collectorsAfter you have created a new installation, with an audit management database and at least one audit store and audit store database, you must add the collectors that will receive audit records from the agents and forward those records to the audit store. For redundancy and scalability, you should have at least two collectors. For more information about planning how many collectors to use and the recommended hardware and network configuration for the collector computers, see “Decide where to install collectors and audit stores” on page 24.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 59

Page 62: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install the audit collectors

Set the required permission

Before you configure a collector, you should check whether your user account has sufficient permissions to add new collector accounts to the audit store database. If you are a database administrator or logged on with an account that has system administrator privileges, you should be able to configure the collector without modifying your account permissions. If you have administrative rights on the computer that hosts Audit Manager but are not a database administrator, you can set the appropriate permission before continuing.

To set the permission required to add accounts to the audit store database:

1 Open Audit Manager.

2 Expand the installation, then expand Audit Stores.

3 Select the audit store that the collector will connect to, right-click, then click Properties.

4 Click the Security tab.

5 Click Add to search for and select the user who will configure the collector.

6 Select the Manage SQL Logins right, then click OK.

Auditing Administrator’s Guide 60

Page 63: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install the audit collectors

Install the collector service using the setup program

If your user account has sufficient permissions to add new collector accounts to the audit store database, you can install a collector by running the setup program on the computer on which you want to install the collector. When you are prompted to select components, select Audit Collector and deselect all of the other components, then click Next. Follow the instructions in the wizard to select the location for installing files and to confirm your selections, then click Finish to complete the installation.

Configure the audit collector service

By default, when you click Finish, the setup program opens the Collector Configuration Wizard. Alternatively, you can launch the configuration wizard at any time by clicking Configure in the Collector Control Panel.

To configure the collector service:

1 Type the port number to use, then click Next.

The default port is 5063 for communication from agents to the collector. If you specify a different port and have the default Windows firewall turned on, the wizard checks whether the port is open.

If you are using another vendor’s firewall, open the port with the tools provided by that vendor. If there’s an upstream firewall—such as a dedicated firewall appliance—between the collector and the computers to be audited, contact the appropriate personnel to open the port on that firewall.

2 Select the installation of which this collector will be a part, then click Next.

The configuration wizard verifies that the installation has an audit store that services the site that the collector is in and that the collector and its audit store database are compatible.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 61

Page 64: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

3 Select whether you want to use Windows authentication or SQL Server authentication when the collector authenticates to the audit store database, then click Next.

In most cases, you should choose Windows authentication to add the computer account to the audit store database as a trusted, incoming user.

If Microsoft SQL Server is in a different forest or in an untrusted forest, you should use SQL Server Management Studio to set up one or more SQL Server login accounts for the collector. After you create the SQL Server login account for the collector to use, you can select SQL Server authentication, then type the SQL Server login name and password in the wizard.

4 Type the maximum number of connections for the Microsoft SQL Server connection pool, then click Next.

5 Review your settings for the collector, then click Next.

6 Click Finish to start the collector service and close the wizard.

Install Windows agentsYou must install an agent on every Windows computer that you want audit. You can install the agent in the following ways:

Interactively, by running the Centrify setup program on each computer.

When the installation finishes, the agent configuration wizard launches automatically. You can configure the agent right away, or exit the configuration wizard and configure the agent later. See “Installing interactively using the setup program” on page 64 for details.

Silently, by executing appropriate commands in a terminal window on each computer.

You can installation silently on a local computer or use a software distribution product, such as Microsoft System Center Configuration Manager (SCCM), to execute the appropriate commands remotely to deploy agents on remote computers. After

Auditing Administrator’s Guide 62

Page 65: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

installation, you can change the default agent settings, if needed. See “Installing silently by using the Microsoft Windows Installer” on page 71 for details.

Silently and centrally, by using a group policy to execute commands remotely on the computers in a domain or organizational unit.

If you use the Centrify Group Policy Deployment files, you can both install and configure the registry on remote computers from a central location without a separate software distribution product. However, you must configure the Windows agent registry settings in a file before deploying. See “Installing from a central location by using group policy” on page 81 for details.

Regardless of the deployment method you choose, you should first make sure that the computers where you plan to deploy meet all of the installation prerequisites.

Verify prerequisites

Before installing the Windows agent, verify the computer on which you plan to install meets the following requirements:

The computer is running a supported Windows operating system version.

The computer is joined to Active Directory.

The computer has sufficient processing power, memory, and disk space for the agent to use.

The computer has the .NET Framework, version 4.5.2 or later.

The computer has Windows Installer version 3.1, or later.

If you are installing interactively using the setup program, the setup program can check that the local computer meets these requirements and install any missing software. If you are installing silently from the command line or by using a Group Policy Object, you should verify the computers where you plan to install meet these requirements. If you are installing silently and a computer does not meet these requirements, the installation will fail.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 63

Page 66: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

Installing interactively using the setup program

If you select auditing when you install the Windows agent, the agent starts capturing user session activity immediately after it is installed. Therefore, you should be sure that you have an installation, audit store database, and collector prepared and available before installing an agent. If the agent cannot connect to an installation, it stores the captured session data locally and can quickly overload the local computer’s resources.

To install the agent on Windows using the setup program:

1 Log on to the computer and insert the CD or browse to the location where you have saved downloaded Centrify files.

If the Getting Started page is not displayed automatically, open the autorun.exe file.

2 On the Getting Started page, click Agent to start the setup program for the Windows agent.

3 At the Welcome page, click Next.

4 Review the terms of the license agreement, click I accept the terms in the License Agreement, then click Next.

5 Verify the location where files will be installed, then click Next.

If you want to install in a location other than the default location, click Browse, select a different location, then click Next.

6 Click Install.

7 Click Finish to complete the installation and start the agent configuration wizard.

Auditing Administrator’s Guide 64

Page 67: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

8 In the Centrify Agent Configuration window, click Add Service.

9 In the dialog box that opens, select the Centrify Auditing and Monitoring Service option and click OK.

10 In the Enable session capture and replay window, select the auditing installation to which you want the agent on this computer to connect.

Click Next to continue.

The Centrify Auditing and Monitoring Service is now listed as an enabled service.

11 Close the Agent configuration window and click Exit in the installer window.

Configuring the agent settings for auditing

The agent configuration wizard automatically configures several default settings in the agent registry. If you want to view or change the agent settings for auditing on a Windows computer after running the configuration wizard—or if you did not use the configuration wizard immediately after installation—you can use the Agent Configuration Wizard.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 65

Page 68: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

To configure the agent settings for auditing:

1 Click Start > All Programs > Centrify Infrastructure Services 2017 > Agent Configuration.

2 In the Centrify Agent Configuration window, locate the Centrify Auditing and Monitoring Service option, and click Settings.

The Centrify Auditing and Monitoring Service Settings window opens.

3 On the General tab, click Configure.

4 Select the maximum color quality for recorded sessions, then click Next.

If your audit installation has video capture auditing enabled, you can configure the color depth of the sessions to control the size of data that must be transferred over the network and stored in the database. A higher color depth increases the CPU overhead on audited computers but improves resolution when the session is played back. A lower color depth decreases network traffic and database storage requirements, but reduces the resolution of recorded sessions.

The default color quality is Low (8-bit).

5 Specify the offline data location and the maximum percentage of disk that the offline data file should be allowed to occupy, then click Next.

If the agent cannot connect to a collector, it saves session activity in the offline data location you specify until it can contact a collector.

The spool threshold defines the minimum percentage of disk space that should be available to continue auditing. It is intended to prevent audited computers from running out of disk space if the agent is sending data to its offline data storage location because no collectors are available.

For example, if you set this threshold to 10%, auditing will continue while spooling data to the offline file location as long as there's at least 10% disk space is available on the spool partition. When the disk space available reaches the threshold, auditing will stop until a collector is available.

Auditing Administrator’s Guide 66

Page 69: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

The agent checks the spool disk space by periodically running a background process. By default, the background process runs every 15 seconds. Because of the delay between background checks, it is possible for the actual disk space available to fall below the threshold setting. If this were to occur, auditing would stop at the next interval. You can configure the interval for the background process to run by editing the HKLM\Software\Centrify\DirectAudit\Agent\DiskCheckInterval registry setting.

6 Select the installation that the agent belongs to, then click Next.

7 In the Summary page, review your settings, then click Next.

The agent is now configured and enabled for auditing.

8 Click Finish to close the agent configuration wizard, then click Close to exit the Centrify Auditing and Monitoring Service Settings window.

Deciding to install with or without joining the computer to a zone

Before you begin a silent installation, you should decide whether you will wait until later to join the computer to a zone, or join the computer to a zone as part of the installation procedure.

If you install without joining a zone during installation:

See “Configuring registry settings” on page 71 for details about the registry settings that you can configure manually after the installation finishes.

See “Installing silently without joining a zone” on page 68 for details about performing the installation.

If you install and join a zone during installation:

You use a transform (MST) file that is provided with Centrify Infrastructure Services to configure a default set of agent-specific registry keys during the silent installation.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 67

Page 70: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

You can optionally edit the MST file before performing the installation to customize agent-specific registry settings for your environment.

You can optionally usethe agent configuration control panel or the registry editor to configure registry settings after the installation finishes.

See “Configuring registry settings” on page 71 for details about the registry settings that you can configure by editing the MST file.

See “Editing the default transform (MST) file” on page 76 for details about how to edit the MST file before you perform the installation.

See “Installing and joining a zone silently” on page 70 for details about performing the installation.

Installing silently without joining a zone

This section describes how to install the agent silently without joining the computer to a zone. This procedure includes configuring registry settings manually using the registry editor or a third-party tool.

Note To install the agent and join the computer to a zone during installation, see “Installing and joining a zone silently” on page 70 for more information.

Check prerequisites:

1 Verify that the computers where you plan to install meet the prerequisites described in “Verify prerequisites” on page 63. If prerequisites are not met, the silent installation will fail.

2 If you are installing auditing, verify that the following tasks have been completed:

a Installed and configured the SQL Server management database and the SQL Server audit store database.

b Installed and configured one or more collectors.

c Configured and applied the Centrify DirectAudit Settings group policy that specifies the installation name.

Auditing Administrator’s Guide 68

Page 71: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

To install the Centrify Agent for Windows silently without joining the computer to a zone:

1 Open a Command Prompt window or prepare a software distribution package for deployment on remote computers.

For information about preparing to deploy software on remote computers, see the documentation for the specific software distribution product you are using. For example, if you are using Microsoft System Center Configuration Manager (SCCM), see the Configuration Manager documentation.

2 Run the installer for the Centrify Agent for Windows package. For example: msiexec /qn /i "Centrify Agent for Windows64.msi"

By default, none of the services are enabled.

3 Use the registry editor or a configuration management product to configure the registry settings for each agent.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 69

Page 72: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

For example, under HKEY_LOCAL_MACHINE\Software\Centrify\DirectAudit\Agent, you could set the DiskCheckThreshold key to a value other than the default value of 10%.

To install the Centrify Agent for Windows and add a computer to a zone during installation:

1 Prepare a computer account in the appropriate zone using Access Manager or the PowerShell command New-CdmManagedComputer.

2 You will use the default transform file Group Policy Deployment.mst in Step 3 to update the MSI installation file so that the computer is joined to the zone in which it was pre-created in Step 1. You can optionally modify Group Policy Deployment.mst to change or add additional registry settings during installation.

If you want to edit Group Policy Deployment.mst to change or add additional registry settings and have not yet done so, edit it now as described in “Editing the default transform (MST) file” on page 76.

Note In order for the computer to join the zone from Step 1, the Group Policy Deployment.mst file must specify the GPDeployment property with a value of 1.

3 Run the following command:

msiexec /i "Centrify Agent for Windows64.msi" /qn TRANSFORMS="Group Policy Deployment.mst"

Installing and joining a zone silently

This section describes how to install the agent and join the computer to a zone at the same time. The procedure described here includes the following steps in addition to executing the MSI file:

You first prepare (pre-create) the Windows computer account in the appropriate zone.

You execute an MST file together with the MSI file to join the computer to a zone and configure registry settings during the installation.

Auditing Administrator’s Guide 70

Page 73: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

Installing silently by using the Microsoft Windows Installer

If you want to perform a “silent” (also called unattended) installation of the Centrify Agent for Windows, you can do so by specifying the appropriate command line options and Microsoft Windows Installer (MSI) file to deploy. You must execute the commands on every Windows computer that you want to audit.

You can also use silent installation commands to automate the installation or upgrade of the Windows agent on remote computers if you use a software distribution product, such as Microsoft System Center Configuration Manager (SCCM), that enables you to run commands remotely to deploy software packages. However, only the command-line instructions are covered in this guide.

Configuring registry settings

When you perform a silent installation, several registry settings specific to the agent are configured by the default MSI file. In addition, a default transform (MST) file is provided for you to use if you join the computer to a zone as part of the installation procedure. When executed together, the default MSI and MST files ensure that the computer is joined to a zone, and that a default set of agent-specific registry keys is configured.

If your environment requires different or additional registry settings, you can edit the MST file before performing an installation. Then, when you execute the MSI and MST files to perform an installation, your customized registry settings are implemented. For details about how to edit the MST file, see “Editing the default transform (MST) file” on page 76.

Note If you do not join the computer to a zone during installation, you do not use the MST file. In this situation, you can create or edit registry keys manually after the installation finishes by using the registry editor.

The following table describes the agent-specific registry settings that are available for you to configure during installation (by using the MST file) or after installation (by using the registry editor). Use the information in this table if you need to configure registry settings differently than how they are configured by the default MSI and MST

Chapter 3 • Installing Centrify Auditing and Monitoring Service 71

Page 74: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

files. Keep the following in mind as you review the information in the table:

The default MSI file is named Centrify Agent for Windows64.msi, and is located in the Agent folder in the Centrify download location.

The default MST file is named Group Policy Deployment.mst, and is located in the Agent folder in the Centrify download location.

All of the settings in the following table are optional, although some are included in the default MSI and MST files so that they are configured when the MSI and MST files execute during an installation.

Settings that are included in the default MSI and MST files are noted in the table.

Some settings are environment-specific, and therefore do not have a default value. Others are not environment-specific, and do have a default value.

The settings described in the table are located in the MSI file’s Property table.

The Setting column shows both the property name in the MSI file, and the name (in parentheses) of the registry key in the Windows registry.

{Service Setting Description

Auditing and Monitoring

INSTALLLEVEL Add this property to the Property table to install identity management, privilege management, and auditing features.

By default, only identity management and privilege management features are installed. You must add this property and value to install auditing features.

This setting is not included in the default MSI file.

Auditing Administrator’s Guide 72

Page 75: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

Auditing and Monitoring

REG_MAX_FORMAT (Max-Format)

Specifies the color depth of sessions recorded by the agent.

The color depth affects the resolution of the activity recorded and the size of the records stored in the audit store database when you have video capture auditing enabled. You can set the color depth to one of the following values:

• 0 to use the native color depth on an audited computer.

• 1 for a low resolution with an 8-bit color depth

• 2 for medium resolution with a 16-bit color depth (default)

• 4 for highest resolution with a 32-bit color

This setting is included in the default MSI file. In the registry, this setting is specified by a numeral (for example, 1). In the MSI file Property table, it is specified by the # character and a numeral (such as #1). The default value is 1.

{Service Setting Description

Chapter 3 • Installing Centrify Auditing and Monitoring Service 73

Page 76: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

Auditing and Monitoring

REG_DISK_CHECK_-THRESHOLD (DiskCheck-Threshold)

Specifies the minimum amount of disk space that must be available on the disk volume that contains the offline data storage file. You can change the percentage required to be available by modifying this registry key value.

This setting is included in the default MSI file. In the registry, this setting is specified by a numeral (for example, 1). In the MSI file Property table, it is specified by the # character and a numeral (such as #10).

The default value is 10, meaning that at least 10% of the disk space on the volume that contains the offline data storage file must be available. If this threshold is reached and there are no collectors available, the agent stops spooling data and audit data is lost.

Auditing and Monitoring

REG_SPOOL_DIR (SpoolDir)

Specifies the offline data storage location.

The folder location you specify will be where the agent saves (“spools”) data when it cannot connect to a collector.

This setting is not included in the default MSI file. To use it, you must edit the default transform (MST) file so that it is processed together with the MSI file during installation, or create it manually in the registry after the installation finishes.

{Service Setting Description

Auditing Administrator’s Guide 74

Page 77: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

Auditing and Monitoring

REG_INSTALLATION_ID (InstallationId)

Specifies the unique global identifier (GUID) associated with the installation service connection point.

This setting is not included in the default MSI file. To use it, you must edit the default transform (MST) file so that it is processed together with the MSI file during installation, or create it manually in the registry after the installation finishes.

Auditing and Monitoring

REG_LOG_LEVEL_DA (LogLevel)

Specifies what level of information, if any, is logged. Possible values are:

•off

• information

• warning

• error

• verbose

This setting is included in the default MSI file. The default value is information.

Identity & Privilege REG_RESCUEUSERSIDS (RescueUserSids)

Specifies which users have rescue rights. Type user SID strings in a comma separated list. For example:user1SID,user2SID,usernSID

This setting is not included in the default MSI file. To use it, you must edit the default transform (MST) file so that the setting is processed together with the MSI file during installation, or create it manually in the registry after the installation finishes.

{Service Setting Description

Chapter 3 • Installing Centrify Auditing and Monitoring Service 75

Page 78: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

Editing the default transform (MST) file

The default transform file, Group Policy Deployment.mst, enables you to specify registry key settings that are different from the default settings that are defined in the MSI file. You can use the Group Policy Deployment.mst file to customize a silent installation for a specific environment.

Identity & Privilege REG_LOG_LEVEL_DZ (LoggingLevel)

Specifies what level of information, if any, is logged. Possible values are:

•off

• information

• warning

• error

• verbose

This setting is included in the default MSI file. The default value is information.

Identity & Privilege GPDeployment Specifies whether the computer is joined to the zone where the computer was pre-created. This setting is used only during installation and does not have a corresponding registry key. Possible values are:

• 0 - The computer is not joined to the zone.

• 1 - The computer is joined to the zone.

This setting is included in the default transform (MST) file. To use it, you must execute the MST file when you execute the default MSI file. The default value is 1, meaning that the pre-created computer is joined to the zone.

{Service Setting Description

Auditing Administrator’s Guide 76

Page 79: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

If you want to customize the agent settings for your environment, you should edit the Group Policy Deployment.mst file before executing the command to perform a silent installation. If you want to use the default settings specified in the MSI file, you can skip this section and go directly to “Installing silently from the command line” on page 80.

You must use the Orca MSI editor to edit the Group Policy Deployment.mst file. Orca is one of the tools available in the Windows SDK. If you do not have the Windows SDK or Orca installed on your computer, you can download and install it from this location:

http://msdn.microsoft.com/en-us/library/aa370557(v=vs.85).aspx

To edit the default MST file:

1 In the Agent folder in the Centrify download location, create a backup copy of the default Group Policy Deployment.mst file.

2 Open a Command Prompt window and execute the following command to launch Orca:Orca.exe

3 In Orca, select File > Open and open the Centrify Windows Agent64.msi file located in the Agent folder in the Centrify download location.

4 In Orca, select Transform > Apply Transform.

5 In Orca, navigate to the Agent folder in the Centrify download location and open Group Policy Deployment.mst.

The file is now in transform edit mode, and you can modify data rows in it.

6 In the Orca left pane, select the Property table.

Notice that a green bar displays to the left of “Property” in the left pane. This indicates that the Property table will be modified by the MST file.

The right pane displays the properties that configure registry keys when you execute the command to install the agent using the MSI file. Notice that the last property in the table, GPDeployment, is

Chapter 3 • Installing Centrify Auditing and Monitoring Service 77

Page 80: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

highlighted in a green box. This indicates that the GPDeployment property will be added to the MSI file by the MST file.

7 In the right pane, edit or add properties as necessary to configure registry keys for your environment.

Property DescriptionREG_MAX_FORMAT Sets the MaxFormat registry key to specify the

color depth of sessions recorded by the agent.

The color depth affects the resolution of the activity recorded and the size of the records stored in the audit store database when you have video capture auditing enabled.

In the MSI file Property table, you can set the color depth to one of the following values:

• #0 to use the native color depth on an audited computer.

• #1 for a low resolution with an 8-bit color depth.

• #2 for medium resolution with a 16-bit color depth.

• #4 for highest resolution with a 32-bit color.

The default value is #1. To edit this property, double-click the Value column and type a new value.

REG_DISK_CHECK_-THRESHOLD

Sets the DiskCheckThreshold registry key to specify the minimum amount of disk space that must be available on the disk volume that contains the offline data storage file.

In the MSI file Property table, the default value is #10, meaning that at least 10% of the disk space on the volume that contains the offline data storage file must be available. You can change the percentage required to be available. To edit this property, double-click the Value column and type a new value.

Auditing Administrator’s Guide 78

Page 81: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

8 After you have made the necessary modifications, select Transform > Generate Transform to save your modifications to the default MST file.

Be sure to save the MST file in the same folder as the MSI file. If the MST and MSI files are in different folders, the MST file will not execute when you execute the MSI file.

REG_SPOOL_DIR Sets the SpoolDir registry key to specify the offline data storage location.

The folder location you specify will be where the agent saves data when it cannot connect to a collector.

To add a this property to the transform file, right-click anywhere in the property table, then select Add Row.

REG_INSTALLATION_ID Sets the InstallationId registry key to specify the unique global identifier (GUID) associated with the installation service connection point.

This property is not required if you are using the Installation group policy to identify the audit installation to use. If you are not using group policy to identify the audit installation, you can add a this property to the transform file. Right-click anywhere in the property table, then select Add Row to add the property and value to the file.

REG_LOG_LEVEL_DA Sets the LogLevel registry key to specifies what level of information, if any, is logged. Possible values are:

•off

• information

• warning

• error

• verbose

The default value is information. To edit this property, double-click the Value column and type a new value.

Property Description

Chapter 3 • Installing Centrify Auditing and Monitoring Service 79

Page 82: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

The MST file is now ready to be used as described in “Installing silently from the command line” on page 80.

Installing silently from the command line

If you want to perform a “silent” or unattended installation of the Centrify Agent for Windows, you can do so by specifying the appropriate command line options and Microsoft Windows Installer (MSI) file to deploy.

Before running the installation command, you should verify the computers where you plan to install meet the prerequisites described in “Verify prerequisites” on page 63. If the prerequisites are not met, the silent installation will fail. You should have also completed the following tasks:

Installed and configured the SQL Server management database and the SQL Server audit store database.

Installed and configured one or more collectors.

Configured and applied the Centrify DirectAudit Settings group policy that specifies the installation name.

You can use similar steps to install the Centrify Common Component using the Centrify Common Component64.msi file before you install the agent. If you install the common component first, information about the agent installation is recorded in a log file for troubleshooting purposes. However, you are not required to install the common component separately from the agent.

To install the Centrify Agent for Windows silently:

1 Open a Command Prompt window or prepare a software distribution package for deployment on remote computers.

2 Run the installer for the Centrify Agent for Windows package for a 64-bit architecture with the appropriate command line options.

For example, to install the Centrify Common Component on a computer with 64-bit architecture, run the following command:msiexec /i "Centrify Common Component64.msi" /qn

Auditing Administrator’s Guide 80

Page 83: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

If you want to enable both auditing and access control features on a computer with a 64-bit operating system and use the values defined in the Group Policy Deployment.mst file, you would run the following command:msiexec /i "Centrify Windows Agent64.msi" /qn TRANSFORMS="Group Policy Deployment.mst"

Installing from a central location by using group policy

You can use a Group Policy Object (GPO) to automate the deployment of Centrify Agents for Windows. Because automated installation fails if all the prerequisites are not met, be sure that all the computers on which you intend to install meet the requirements described in “Verify prerequisites” on page 63.

You can use similar steps to install the Centrify Common Component using the Centrify Common Component64.msi file before you install the agent. If you install the common component first, information about the agent installation is recorded in a log file for troubleshooting purposes. However, you are not required to install the common component separately from the agent.

In most cases, you can use the default agent settings defined in the Group Policy Deployment.mst transform file. If you want to modify the default settings prior to installation, see the instructions in “Editing the default transform (MST) file” on page 76.

To create a Group Policy Object for the deployment of Centrify Agents for Windows:

1 Copy the Centrify Windows Agent64.msi and Group Policy Deployment.mst files to a shared folder on the domain controller or a location accessible from the domain controller.

When you select a folder for the files, right-click and select Share with > Specific people to verify that the folder is shared with Everyone or with appropriate users and groups.

2 On the domain controller, click Start > Administrative Tools > Group Policy Management.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 81

Page 84: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install Windows agents

3 Select the domain or organizational unit that has the Windows computers where you want to deploy the Centrify agent, right-click, then select Create a GPO in this domain, and Link it here.

For example, you might have an organizational unit specifically for Centrify-managed Windows computers. You can create a group policy object and link it to that specific organizational unit.

4 Type a name for the new Group Policy Object, for example, Centrify Agent Deployment, and click OK.

5 Right-click the new Group Policy Object and click Edit.

6 Expand Computer Configuration > Policies > Software Settings.

7 Select Software installation, right-click, and select New > Package.

8 Navigate to the folder you selected in Step 1, select the Centrify Windows Agent64.msi file, and click Open.

9 Select Advanced and click OK.

10 Click the Modifications tab and click Add.

11 Select the Group Policy Deployment.mst file, click Open, and click OK.

12 Close the Group Policy Management Editor, right-click the Centrify Agent Deployment group policy object, and verify that Link Enabled is selected.

By default, when computers in the selected domain or organizational unit receive the next group policy update or are restarted, the agent will be deployed and the computer will be automatically rebooted to complete the deployment of the agent.

If you want to test deployment or deploy immediately, you can open a Command Prompt window to log on to a Windows client as a domain administrator and force group policies to be updated immediately by running the following command:

gpupdate /force

After installation, all of the registry settings that were specified in the MSI and MST files are configured. If you need to change any of the

Auditing Administrator’s Guide 82

Page 85: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install UNIX agents

default agent settings, open the DirectAudit Agent Control Panel or the Registry Editor.

For more information about how to configure and use Group Policy Objects, see the documentation on the Microsoft Windows website.

Install UNIX agentsYou can install the auditing services for Linux or UNIX computers interactively using Deployment Manager or the agent installation script, install.sh. If you want to run the installation script silently or use a native package manager to install UNIX agents, see “Installing the UNIX agent on remote computers” on page 196.

The steps in this section describe how to install interactively using the install.sh script, which automatically installs platform-specific software packages and invokes the proper installation mechanism and options for a computer’s operating system.

To install the agent using the Suite installation script:

1 Log on as a user with root privileges.

2 Mount the cdrom device using the appropriate command for the local computer’s operating environment, if necessary.

Note If you are not using the CD, verify the location and go on to the next step.

3 Change to the appropriate directory.

For example, to install on an AIX computer from the Centrify CD or ISO file, change to the UNIX directory:cd Agent_Unix22

4 Run the Suite Installer and respond to its questions:./install.sh

If there is an installation with the name DefaultInstallation, the UNIX agent uses it by default. If you are using an installation with a name other than DefaultInstallation, you must identify the installation by using dacontrol or group policy after installing the agent. For more information, see “Checking the status of the UNIX agent” on page 171.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 83

Page 86: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install UNIX agents

5 After installing the package, use dainfo to verify that the agent is installed and running. You should see output similar to the following that indicates the agent is Online:Pinging adclient: adclient is availableDaemon status: OnlineCurrent installation: 'PistolasSF' (configured locally)Current collector: DC2008r2-LG.pistolas.org:5063:HOST/[email protected] ...

If the output of dainfo indicates that the agent is Offline or that auditing is not enabled, verify your network connections and try restarting the auditing service or run the command to enable auditing manually as described in “Enabling and disabling auditing on Linux and UNIX computers” on page 84.

You must adjust the disk space requirements higher if you allocate a large amount of offline storage to use when none of the collectors servicing the audit store can be reached. This and other parameters are in a text file named centrifyda.conf in /etc/centrifyda on each audited computer that has the UNIX agent installed. For more information about setting configuration parameters, see “Configuring the UNIX agent off-line database” on page 128. For information about all of the configuration parameters available to customize auditing, see the Centrify Infrastructure Services Configuration and Tuning Reference Guide.

Enabling and disabling auditing on Linux and UNIX computers

After you install the agent, you can enable auditing with the dacontrol command. The dacontrol command links all shells to the cdash shell wrapper by way of NSS. When a user opens a terminal, cdash is automatically loaded instead of the user’s shell, then cdash loads the appropriate shell for the user and begins auditing the session.

To enable auditing on a Linux or UNIX computer:

1 Log on as a user with root privileges.

2 Run dacontrol with the -e option:dacontrol -e

Auditing Administrator’s Guide 84

Page 87: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Install additional Audit Manager or Audit Analyzer consoles

3 Run dacontrol again to verify that auditing has been enabled.

For example:dacontrol --queryThis machine has been configured through group policy to use installation 'DefaultInstallation'DirectAudit NSS module: ActiveDirectAudit is not configured to audit individual commands.

After you enable auditing on a Linux or UNIX computer, you can control whether the auditing of shell activity applies for all users or for selected users by using role assignments. If auditing is enabled and the agent is not running, users with an active role assignment that requires logging are not allowed to log in.

For more information about configuring and assigning roles, see the Administrator’s Guide for Linux and UNIX.

Install additional Audit Manager or Audit Analyzer consoles

If you need to make Audit Manager or Audit Analyzer consoles available to other users, you can install additional consoles on other computers. For example, install Audit Analyzer on computers used by auditors in your organization.

Chapter 3 • Installing Centrify Auditing and Monitoring Service 85

Page 88: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 4

Managing an installation

This chapter describes how to secure and manage an audit installation after the initial deployment of Centrify software. It includes tasks that are done by users assigned the Master Auditor role for an installation and users who are Microsoft SQL Server database administrators.

The following topics are covered:

Securing an installation

Configuring selective auditing

Configuring agents to prefer collectors

Adding licenses

Enabling audit notification

Enabling or disabling video capture auditing

Preventing users from reviewing or deleting sessions

Adding an installation

Publishing installation information

Removing or deleting an installation

Managing audit store databases

Managing audit stores

Managing the audit management database

Maintaining database indexes

Managing collectors

Managing audited computers and agents

Delegating administrative permissions

Managing audit roles

86

Page 89: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Securing an installation

Securing an installationFor production deployments, you can take the following steps to secure the installation:

Use the Installation group policy to specify which installation agents and collectors are part of. By enabling the Installation group policy you can prevent local administrators from configuring a computer to be part of an unauthorized installation.

Configure a trusted group of collectors to prevent a hacker from creating a rogue collector to collect data from agents.

Configure a trusted group of agents to prevent a hacker from performing a Denial of Service attack on the collector and database by flooding a collector with bogus audit data.

Encrypt all data sent from the collector to the database.

Before you can follow these steps to secure an installation, you must have access to an Active Directory user account with permission to create Active Directory security groups, enable group policies, and edit Group Policy Objects.

To secure an installation using Windows group policy

1 Open the Group Policy Management console.

2 Expand the forest and domains to select the Default Domain Policy object.

3 Right-click, then click Edit to open Group Policy Management Editor.

4 Expand Computer Configuration > Policies > Centrify Infrastructure Services Settings, then select Common Settings.

5 Double-click the Installation policy in the right pane.

6 On the Policy tab, select Enabled.

7 Click Browse to select the installation you want to secure, then click OK.

8 Click OK to close the Installation properties.

Chapter 4 • Managing an installation 87

Page 90: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Securing an installation

Securing an audit store with trusted collectors and agents

By default, audit stores are configured to trust all audited computers and collectors in the installation. Trusting all computers by default makes it easier to deploy and test auditing in an evaluation or demonstration environment. For a production environment, however, you should secure the audit store by explicitly defining the computers the audit store can trust.

You can define two lists of trusted computers:

Audited computers that can be trusted.

Collector computers that can be trusted.

To secure an audit store:

1 Open the Audit Manager console.

2 Expand the installation and Audit Stores nodes.

3 Select the audit store you want to secure, right-click, then select Properties.

4 Click the Advanced tab.

5 Select Define trusted Collector list, then click Add.

6 Select a domain, click OK, then search for and select the collectors to trust and click OK to add the selected computers to the list.

Only the collectors you add to the trusted list are allowed to connect to the audit store database. All other collectors are considered untrusted and cannot write to the audit store database.

7 Select Define trusted Audited System list, then click Add.

8 Select a domain, click OK, then search for and select the audited computers to trust and click OK to add the selected computers to the list.

Only the audited computers you add to the trusted list are allowed to connect to the trusted collectors. All other computers are

Auditing Administrator’s Guide 88

Page 91: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Securing an installation

considered untrusted and cannot send audit data to trusted collectors.

9 Click OK to close the audit store properties dialog box.

The following example illustrates the configuration of trusted collectors and trusted audited computers.

In this example, the audit store trusts the computers represented by P, Q, and R.Those are the only computers that have been identified as trusted collectors in the audit store Properties. list. The audit store has been configured to trust the audited computers represented by D, E, and F. As a result of this configuration:

Audited computers D, E, and F only send audit data to the trusted collectors P, Q, and R.

Trusted collectors P, Q, and R only accept audit data from the trusted audited computers D, E, and F.

The audit store database only accepts data for its trusted collectors P, Q, and R, and therefore only stores audit data that originated on the trusted audited computers D, E, and F.

Disabling a trusted list

After you have added trusted collectors and audited computers to these lists, you can disable either one or both lists at any time to remove the security restrictions. For example, if you decide to allow

Chapter 4 • Managing an installation 89

Page 92: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Securing an installation

auditing data from all audited computers, you can open the audit store properties, click the Advanced tab, and deselect the Define trusted Audited System list option. You don’t have to remove any computers from the list. The audit store continues to only accept data from trusted collectors.

Using security groups to define trusted computers

You can use Active Directory security groups to manage trusted computer accounts. For example, if you create a group for trusted audited computers and a group for trusted collectors, you can use those groups to define the list of trusted collectors and audited computers for the audit store. Any time you add a new computer to one of those groups, thereafter, it is automatically trusted, without requiring any update to the audit store properties.

Securing network traffic with encryption

The last step in securing an installation is to secure the data collected and stored through encryption. The following summarizes how data is secured as it moves from component to component:

Between an audited computer and the spooler that stores the data locally when no collectors are available, audit data is not encrypted. Only the root user or local Administrator account can access the data by default.

Between the audited computer’s data collection service (dad on UNIX or wdad on Windows) and the collector, data is secured using Generic Security Services Application Program Interface (GSSAPI) with Kerberos encryption.

Between the collector and the audit store database, data can be secured using Secure Socket Layer (SSL) connections and ARC4 or AES encryption if the database is configured to use SSL connections.

Between the audit store and management databases, data can be secured using Secure Socket Layer (SSL) connections and ARC4 or AES encryption if the database is configured to use SSL connections.

Auditing Administrator’s Guide 90

Page 93: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Securing an installation

Between the management database and the Audit Manager console, data can be secured using Secure Socket Layer (SSL) connections and ARC4 or AES encryption if the database is configured to use SSL connections.

The following illustration summarizes the flow of data and how network traffic is secured from one component to the next.

Enabling Secure Socket Layer (SSL) communication

Although the database connections can be secured using SSL, you must configure SSL support for Microsoft SQL Server as part of SQL Server administration. You must also have valid certificates installed on clients and the database server. If you are not the database administrator, you should contact the database administrator to determine whether encryption has been enabled and appropriate certificates have been installed. For more information about enabling SSL encryption for SQL Server and installing the required certificates, see the following Microsoft support article:

http://support.microsoft.com/kb/316898.

Enabling encryption for Microsoft SQL Server Express

If you use Microsoft SQL Server Express, encryption is turned off by default. To secure the data transferred to the database server, you should turn encryption on.

To enable encryption for each audit store and management database:

1 Log on to the computer hosting an audit store or management database with an account that has database administrator authority.

Chapter 4 • Managing an installation 91

Page 94: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Securing an installation

2 Open SQL Server Configuration Manager.

3 Select the SQL Server Network Configuration node, right-click Protocols for DBINSTANCE, then select Properties.

4 On the Flags tab, select Yes for the Force Encryption option, then click OK to save the setting.

Using a service account for Microsoft SQL Server

When you install Microsoft SQL Server, you specify whether to use Windows authentication or a mix of Windows and SQL Server authentication. You also specify the accounts that the database services should use. By default, system accounts are used. If SQL Server uses a domain user account instead of a system account, you should ensure that the account has permission to update the SQL Server computer object in Active Directory. If the account has permission to update the computer where SQL Server is running, SQL Server can publish its service principal name (SPN) automatically. Getting the correct service principal name is important because Windows authentication relies on the SPN to find services and auditing uses Windows authentication for console-to-audit management database connections. If the SPN is not found, the connection between the console and audit management database fails.

The audit management database-to-audit store connection and the collector-to-audit store connection can use either Windows authentication or SQL Server authentication. If SQL Server authentication is used, it does not matter whether the SQL Server instance uses a system account or a service account. If you have configured SQL Server to use Windows authentication only, be sure that the Windows account is allowed to connect to the audit management database and to the audit store database.

If the domain user account running SQL Server services does not have permission to update the computer object, see the following Microsoft knowledge base article for information about how to manually register the SPN for SQL Server:

http://support.microsoft.com/kb/909801

Auditing Administrator’s Guide 92

Page 95: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Configuring selective auditing

Configuring selective auditingBy default, the agent captures activity for all users on audited computers, but you can limit auditing to specified users. If you are using identity broker and privilege elevation, you can control auditing by configuring role definitions with different audit requirements then assigning those role definitions to different sets of Active Directory users.

If you are using the Centrify Auditing and Monitoring Service without access management:

You can use group policies to specify which Windows users to audit and which Windows users should not be audited.

For information about configuring group policies to customize auditing, see the Group Policy Guide.

For UNIX users, you can use the dash.user.skiplist configuration parameter to specify the UNIX user accounts and Active Directory UNIX names that you don’t want to audit.

For more information about setting the dash.user.skiplist parameter, see the comments in the /etc/centrifyda/centrifyda.conf file. For information about all of the configuration parameters available to customize auditing, see the Centrify Infrastructure Services Configuration and Tuning Reference Guide.

To control auditing by using group policies:

1 Open the Group Policy Management console.

2 Expand the forest and domains to select the Default Domain Policy object.

3 Right-click, then click Edit to open Group Policy Management Editor.

4 Expand Computer Configuration > Policies > Centrify Infrastructure Services Settings, then select Windows Agent Settings.

5 Select the Audited user list policy and change the policy setting from Not Configured to Enabled, then click Add if you want to identify specific users to audit.

Chapter 4 • Managing an installation 93

Page 96: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Configuring selective auditing

When you enable this group policy, only the users you specify in the policy are audited. If this policy is not configured, all users are audited.

6 Select the Non-audited user list policy and change the policy setting from Not Configured to Enabled, then click Add if you want to identify specific users that should not be audited.

When you enable this group policy, only the users you specify are not audited. If this policy is not configured, all users are audited. If you enable both the Audited user list and the Non-audited user list policies, the users you include in the Non-audited user list take precedence over the Audited user list.

The following table details the effect of choosing to enable the Audited user list policy, the Non-audited user list policy, or a combination of both policies.

Non-audited user list

Audited user list

How the setting affects auditing

Not configured Not configured No users are defined for either policy, so all users accessing audited computers are audited.

Not configured Enabled Only the users you specify in the Audited user list policy are audited.

If you do not specify any users when you enable this policy, no users are audited.

Auditing Administrator’s Guide 94

Page 97: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Configuring agents to prefer collectors

Configuring agents to prefer collectorsIf desired, you can specify that agents first use the collectors that are in the same site as the agent. You configure this option for each audit store.

For example, consider the following installation setup:

One audit store

Two sites (SantaClara and SanDiego)

Two collectors in SantaClara, and two collectors in SanDiego

If you enable the option for the agents to prefer collectors in the same site as the agent, the agents in the SantaClara site use the collectors in that site, and the agents in the SanDiego site use the collectors there.

Enabled Not configured Only the users you specify in the Non-audited user list are exempt from auditing.

If you enable this policy but do not specify any users, no users are exempt from auditing. All users are audited.

Enabled Enabled If both policies are enabled, the non-audited user takes precedence over the audited list of users.

If a user is specified in the audited list, that user is explicitly audited.

If a user is specified in the non-audited list, that user is explicitly not audited.

If the same user is specified in both lists or no users are specified for either policy, no users are audited because the non-audited user takes precedence.

Non-audited user list

Audited user list

How the setting affects auditing

Chapter 4 • Managing an installation 95

Page 98: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Adding licenses

If for some reason all collectors in a site are down, the agents use collectors in another site or configured subnet.

Once an agent fails over and uses a collector in another site, the agent continues to use that collector until a rebinding occurs. You can do a rebinding with the dareload -b command. During the time that the agent is using a collector in another site, dadiag displays a warning message.

If your installation uses agents older than version 2017, those older agents ignore the collector preference setting.

To specify agents use collectors in the same site:

1 Open the Audit Manager console window.

2 Expand Audit Stores, and right-click the desired audit store and select Properties.

3 In the Audit Store Properties dialog box, click Advanced.

4 Select Agents must prefer collectors in the same site as the agent.

By default, this option is not enabled.

5 Click OK to save the changes.

It may take several minutes for the changes to take effect, depending on Active Directory replication delays and policy sets.

Adding licensesWhen you create an audit installation, you must provide at least one license key. The license key can be an evaluation or a permanent license key. If the license key you specify is an evaluation license, you have full use of the software for a limited period of time or for a limited number of audited computers. To continue using the installation after the evaluation license key expires, you must purchase a permanent license key for the number of computers you plan to audit.

Auditing Administrator’s Guide 96

Page 99: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Adding licenses

Each installation maintains separate licensing information. You can add licenses keys at any time by updating the properties for an installation. All licenses are FIPS-compliant.

To add licenses for auditing:

1 Open Audit Manager.

2 Select the installation name, right-click, then select Properties.

3 On the General tab, click Details.

4 Click Add to add a license key.

5 Type the new license key, then click OK.

The new license will appear in the Update area of the Licenses dialog box.

Audit license enforcement

Any time you open the Audit Manager console, Audit Analyzer console, or the session player, a background process determines the availability of audit licenses. Only the audited computers that are currently connected to a collector are included in the license count to determine license usage and compliance. Computers that have been previously audited and have data in the audit store database but are not currently connected to a collector are not included in the license count.

As you increase the number of licenses in use, license enforcement is progressive. If the number of audited computers is less than 90% of the number of licenses you have purchased, there’s no affect on any auditing features. If the number of audited computers is more than 90% of the licenses purchased, enforcement depends on the number of licenses in use:

90-100% of the licensing limit displays a warning message that you are close to over-deployment, but you can continue to use all auditing features.

100-120% of the licensing limit displays a warning message that you must acknowledge by clicking OK when you open any console, after which you can resume using the console or session player.

Chapter 4 • Managing an installation 97

Page 100: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Enabling audit notification

Over 120% of the licensing limit displays a warning message for 60 seconds when you open any console. If you see the 60 second warning message, use the License dialog box to add license keys to continue using auditing features.

You can contact Centrify to purchase additional licenses or remove some audited computers from the installation to bring the number of licenses used into compliance.

Agents and licenses from previous versions of infrastructure services

An installation can include agents and licenses from previous versions of infrastructure services. For example, an installation might include some UNIX agents from DirectAudit 1.x, a mix of UNIX and Windows agents from DirectAudit 2.x, or all new agents on the computers you want to audit.

However, all of the Centrify components installed on an audited computer must be from the same release. For example, you cannot install a 3.x Centrify Agent for Windows with identity broker and privilege elevation features on a Windows computer running a DirectAudit 2.x agent. To install the 3.x Centrify Agent for Windows, you must also upgrade the auditing features of the agent to 3.x.

Enabling audit notificationIf you enable audit notification, users see a message informing them that their actions are being auditing when they log on. After you enable notification, the message is always displayed on audited computers regardless of whether session activity is recorded or not. The notification message does not depend on whether auditing is configured for a role. The message is not used to notify users when they switch from a role without auditing to a role that is audited.

To enable audit notification for an installation:

1 In the Audit Manager console, right-click the installation name, then select Properties.

2 Click the Notification tab.

Auditing Administrator’s Guide 98

Page 101: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Enabling or disabling video capture auditing

3 Select Enable notification.

Deselect this option to turn off notification.

4 Click the browse button to locate and select a text file that contains the message you want to display.

A notification message is required if you select the Enable notification option. The contents of the file you select are displayed below the file location. The maximum text file size is 30 KB.

5 Click the browse button to locate and select an image to appear as a banner across the top of the audit notification.

Displaying a banner image is optional when you enable notification. The maximum image file size is 15 KB. For the best image display, use an image that is 468 pixels wide by 60 pixels high.

Note Animated GIF files are not supported for use as audit notifications. If you do specify an animated GIF, the image displays as a static image.

6 Click OK or Apply.

Users will see the notification message the next time they log in.

7 If you enable notification after you have deployed agents, update the local policy on the audited computers by running the following command: gpupdate /FORCE

Enabling or disabling video capture auditingIn most cases, you decide whether to enable video capture auditing when you create a new installation. You can, however, choose to enable or disable video capture auditing for an installation at any time. For example, you might enable full video capture auditing of user activity during your initial deployment and later find that you are capturing user activity that is of no interest or requires too much database management to store. Conversely, you might initially decide not to enable video capture and later discover that you want to record complete information about user activity when users run privileged commands or open certain applications.

Chapter 4 • Managing an installation 99

Page 102: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Preventing users from reviewing or deleting sessions

You can also choose to enable video capture editing for an installation but disable it for specific computers. You disable or enable video capture auditing for a specific computer or set of computers by using group policy settings or by modifying the agent.video.capture setting. For details, see the Centrify Infrastructure Services Group Policy Guide or the Centrify Infrastructure Services Configuration and Tuning Reference Guide.

To enable or disable video capture auditing for an installation:

1 In the Audit Manager console, right-click the installation name, then select Properties.

2 Click the Audit Options tab.

3 Select Enable video capture auditing of user activity if it is not selected to start capturing a visual record of all user activity when users perform tasks using a role that is configured to be audited.

Deselect this option to stop all video capture auditing. If you disable video capture auditing, you will not be able to replay session activity.

4 Click OK or Apply.

Preventing users from reviewing or deleting sessions

By default, users can update the review status, add comments, and delete their own sessions if they have an audit role with the appropriate permissions. However, there are installation-wide options to prevent any users from updating the review status or deleting their own sessions. These installation-wide options take precedence over audit role permissions for all users.

To prevent all users from updating the review status or deleting their own sessions in an installation:

1 In the Audit Manager console, right-click the installation name, then select Properties.

2 Click the Audit Options tab.

Auditing Administrator’s Guide 100

Page 103: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Adding an installation

3 Select the appropriate settings for your installation.

Select Do not allow any users to review their own sessions if you to prevent all users from updating the review status or adding comments to their own sessions in Audit Analyzer.

Select Do not allow any users to delete their own sessions if you to prevent all users from deleting their own sessions in Audit Analyzer.

4 Click OK or Apply.

Adding an installationAlthough a single installation is the most common deployment scenario, you can configure multiple installations. For example, you can use separate installations to provide concurrent production and test-bed deployments or to support multiple administrative domains within your organization.

To create a new installation:

1 Open Audit Manager.

2 Select the root node, right-click, then select New Installation.

3 Follow the prompts displayed.

The steps are the same as the first installation. For more information, see “Create a new installation” on page 49.

4 Choose the appropriate installation for each collector using the Collector Configuration wizard.

5 Choose the appropriate installation for each agent using the Agent Configuration wizard.

Once you have multiple installations, you can choose which one each collector is part of using the Collector Configuration wizard. You can choose which installation each agent is part of using the Agent Configuration wizard. You can also configure collectors and agents using group policy.

Note Agents can communicate with a collector only if the agents and collector are in the same Active Directory forest.

Chapter 4 • Managing an installation 101

Page 104: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Publishing installation information

Delegating administrative tasks for a new installation

The account you use to create a new installation is the default administrator and Master Auditor with full control over the entire installation and the ability to delegate administration tasks to other Active Directory users or groups. You can grant permission to perform administrative tasks to other users by opening the Properties for each component, then clicking the Security tab.

Opening an installation in a new console

If you create multiple installations at the same site, you can select the installation name, right-click, then select New Window From Here to keep consoles for different installations separate from each other. Creating a new window for each installation can help you avoid performing operations on one installation that you intended to perform on another.

Closing an installation

The Audit Manager console allows you to manage multiple installations. To remove the current installation from the console, but not physically remove the database or the information published to Active Directory, you can select the installation name, right-click, then select Close.

Publishing installation informationCentrify Auditing and Monitoring Service publishes installation information to a service connection point (SCP) object in Active Directory so that audited computers and collectors can look up the information. If the published locations for multiple SCPs in the same installation are not the same, or if collectors cannot read from at least one of the published locations, the collectors are unable to determine which audit store is the best match for the sites and subnets, and so they do not attempt to connect to an audit store.

Auditing Administrator’s Guide 102

Page 105: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Publishing installation information

Permission to publish to Active Directory

Only administrators who have been delegated permission to modify various attributes of the installation can publish those attributes to Active Directory.

At a minimum, you must have the Active Directory permission to Create serviceConnectionPoint objects on the container or organizational unit that you have identified for publishing installation information.

If you do not have Active Directory permission to modify the installation, the updates are kept in the audit management database, and a message is issued to notify you that the installation information could not be updated in Active Directory.

Synchronizing installation information

If you have an Active Directory account with permission to publish information about the installation, you can update the service connection point.

To publish the service connection point for an installation:

1 Open Audit Manager.

2 Select the installation name, right-click, then click Properties.

3 Click the Publication tab, then click Synchronize to publish the information.

In a multi-forest or DMZ environment, this tab lists multiple Active Directory locations to which to publish.

4 Click OK to close the installation properties.

Exporting installation information

If you have an Active Directory account with permission to access installation information, you can export the service connection point that contains the installation information to a file in LDAP Data Interchange Format (LDIF). Exporting installation information can be

Chapter 4 • Managing an installation 103

Page 106: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Removing or deleting an installation

useful if you want to add the domain for a perimeter network to an existing installation. After exporting installation information to a file, you can modify the file—for example, to use a different domain component—then import the modified file using the ldifde command.

To export and import installation information:

1 Open Audit Manager.

2 Select the installation name, right-click, then click Properties.

3 Click the Publication tab.

4 Select the Active Directory location, then click Export.

5 Select a file location and type a file name, then click Save.

6 Click OK to close the installation properties.

7 Use a text editor to modify the file, as needed.

For example, you might use a different domain component—such as DC=dmz1,DC=ajax, DC=org in place of DC=internal, DC=ajax, DC=org—to differentiate between the perimeter and internal networks.

8 Import the modified file using a command similar to the following in a Command Prompt window:ldifde -i -f C:\Users\Administrator\Desktop\sample-dmz.ldif

Removing or deleting an installationBefore you can remove or delete an installation, you must do the following:

Run the setup program to remove all agents and collectors and collector service connection points (SCPs).

Detach and remove all audit store databases.

Open the Installation Properties and click the Publications tab to make sure only one installation service connection point (SCP) is listed.

Auditing Administrator’s Guide 104

Page 107: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

Note To remove service connection points on other sites, contact an administrator with publication permission on those sites.

To remove or delete an installation, select the installation in the Audit Manager console, right-click, then select Remove to open the Remove installation dialog box.

Click Remove to remove the installation but not delete the management database from the SQL Server instance.

Click Delete to remove the installation and delete the management database from the installation of SQL Server.

Note All the publications published to Active Directory are removed when you remove or delete an installation.

Managing audit store databasesDuring the initial deployment, your installation only has one audit store database. As you begin collecting audit data, however, that database can quickly increase in size and degrade performance. Over time, an installation typically requires several Microsoft SQL Server databases to store the data being captured and historical records of session activity, login and role change events, and other information. As part of managing an installation, you must manage these databases to prevent overloading any one database and to avoid corrupting or losing data that you want to keep.

One of the biggest challenges in preparing and managing Microsoft SQL Server databases for storing audit data is that it is difficult to estimate the level of activity and how much data will need to be stored. There are several factors to consider that affect how you configure Microsoft SQL Server databases for auditing data, including the recovery method, memory allocation, and your backup and archiving policies.

The sections below provide guidelines for sizing and managing the Microsoft SQL Server databases you use for audit data. For more complete information about managing and configuring SQL Server, however, you should refer to your Microsoft SQL Server documentation.

Chapter 4 • Managing an installation 105

Page 108: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

Selecting a recovery model

Standard backup and restore procedures come in three recovery models:

Simple—The Simple recovery model allows high-performance bulk copy operations, minimizes the disk space required, and requires the least administration. The Simple Recovery model does not provide transaction log backups, so you can only recover data to the point of the most recent full or differential backup. The default recovery model is Simple, but is not appropriate in cases where the loss of recent changes is not acceptable.

Full—The Full recovery model has no work-loss exposure, limits log loss to changes since the most recent log backup, and provides recovery to an arbitrary time point. However, the Full recovery model uses much more disk space.

Bulk-logged—The Bulk-logged recovery model provides higher performance and minimizes the log space used by disk-intensive operations, such as create index or bulk copy. With the Bulk-logged recovery model, you can only recover data to the point of the most recent full or differential backup. However, because most databases undergo periods of bulk loading or index creation, you can switch between Bulk-logged and Full recovery models to minimize the disk space used to log bulk operations.

When a database is created, it has the same recovery model as the model database. Although the Simple recovery model is the default, the Full and Bulk-Logged recovery models provide the greatest protection for data, and the Full recovery model provides the most flexibility for recovering databases to an earlier point in time. To change the recovery model for a database, use the ALTER DATABASE statement with a RECOVERY clause.

Regardless of the recovery model you choose, you should keep in mind that backup, restore, and archive operations involve heavy disk I/O activity. You should schedule these operations to take place in off-peak hours. If you use the Simple recovery model, you should set the backup schedule long enough to prevent backup operations from affecting production work, but short enough to prevent the loss of significant amounts of data.

Auditing Administrator’s Guide 106

Page 109: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

Configuring the maximum memory for audit store databases

Because Microsoft SQL Server uses physical memory to hold database information for fast query results, you should use a dedicated instance to store auditing data. Because SQL Server dynamically acquires memory whenever it needs it until it reaches the maximum server memory you have configured, you should set constraints on how much physical memory it should be allowed to consume.

The maximum server memory (max server memory) setting controls the maximum amount of physical memory that can be consumed by the Microsoft SQL Server buffer pool. The default value for this setting is such a high number that the default maximum server memory is virtually unlimited. Because of this default value, SQL Server will try to consume as much memory as possible to improve query performance by caching data in memory.

Processes that run outside SQL Server, such as operating system processes, thread stacks, socket connections and Common Language Runtime (CLR) stored procedures are not allowed to use the memory allocated to the Microsoft SQL Server buffer pool. Because those other processes can only use the remaining available memory, they might not have enough physical memory to perform their operations. In most casts, the lack of physical memory forces the operating system to read and write to disk frequently and reduces overall performance.

To prevent Microsoft SQL Server from consuming too much memory, you can use the following formula to determine the recommended maximum server memory:

Reserve 4GB from the first 16GB of RAM and then 1GB from each additional 8GB of RAM for the operating system and other applications.

Configure the remaining memory as the maximum server memory allocated for the Microsoft SQL Server buffer pool.

For example, if the computer hosting the Microsoft SQL Server instance has 32GB of total physical memory, you would reserve 4GB (from first 16 GB) + 1GB (from next 8 GB) + 1 GB (from next 8 GB) for the operating system, then set the Maximum server memory for Microsoft SQL server to 26GB (32GB – 4GB – 1GB – 1GB = 26).

Chapter 4 • Managing an installation 107

Page 110: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

For more information about how to configure Microsoft SQL Server maximum memory setting and other memory options, see the following Microsoft article:

http://msdn.microsoft.com/en-us/library/ms178067(v=sql.105).aspx

You should configure the maximum memory allowed for the Microsoft SQL Server instances hosting audit store databases and the management database. However, this setting is especially important to configure on the Microsoft SQL Server instance hosting the active audit store database.

Using Transact-SQL to configure minimum and maximum memory

You can control the minimum and maximum memory that the SQL Server buffer manager uses by issuing Transact-SQL commands. For example:

sp_configure ‘show advanced options’, 1reconfiguregosp_configure ‘min server memory’, 60reconfiguregosp_configure ‘max server memory’, 100reconfigurego

For more information about configuring SQL Server and setting minimum and maximum server memory using T-SQL, see http://msdn2.microsoft.com/en-us/library/ms178067.aspx

Estimating database requirements based on the data you collect

To determine how auditing will affect database capacity, you should monitor a pilot deployment of 20 to 25 agents with representative activity to see how much data is produced daily. For example, some audited computers might have few interactive user sessions or only

Auditing Administrator’s Guide 108

Page 111: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

short periods of activity. Other audited computers might have many interactive user sessions or long sessions of activity on average.

During the pilot deployment, you want to the following information:

How many interactive user sessions occur daily on each computer?

How long do sessions last on average?

What are the activities being captured, and what is the average size of each session being captured?

How long do you need to store the captured data to balance performance and storage?

What is the data retention period for audited data?

From the information you collect in the pilot deployment and the data retention policy for your organization, you can estimate the database size using the following guideline:

For example, if an average session generated 100 KB in the database and the installation had 250 agents, 10 sessions per agent, and a six-month retention period (about 130 working days), the storage requirement for the audit store database would be 36.9 GB:

250 agents x 10 sessions/agent each day x 100 KB/session x 130 days = 32,500,000 KB

The following table shows examples of the data storage requirement in an installation with Windows agents, typical levels of activity with an

Chapter 4 • Managing an installation 109

Page 112: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

average of one session per day on each audited computer, and the recovery mode set to Simple:

In this example, an installation with 100 Windows agents with low activity would require approximately 10 GB for the audit store database to keep audit data for 6 months. An increase in the number of interactive sessions, session length, or average session size would increase the database storage required.

If SQL Server requires more space to accommodate the new data, it expands the database file immediately, which can cause degraded performance. To reduce the effect of database expansion on performance, allocate sufficient space to support database growth. In addition, monitor database space and when space is low, schedule a database expand operation for an off-peak time.

Reducing color depth to decrease disk usage

If you enable video capture auditing of user activity for an installation, the color depth setting affects the size of sessions stored in the audit store database. Depending on whether you want higher quality video playback or lower disk consumption, you can modify this setting. The growth rate is linear as you increase or decrease the color depth.

Based on a simulation of user activity, changing the color depth from 16-bit to 8-bit reduces disk space by 42%. Changing the color depth from 32-bit to 16-bit reduces disk space by 34 to 39%. If you can accept the lower quality video playback, changing the color depth from 32-bit to 8-bit reduces disk space by 62 to 65%.

Agents

Average session length

Average session size

Daily Weekly 6 Months

100 20 minutes 806 KB - low activity

79 MB 394 MB 10 GB

50 25 minutes 11.56 MB - high activity

578 MB 2.81 GB 73.36 GB

100 20 minutes 9.05 MB - high activity

905 MB 4.42 GB 115 GB

Auditing Administrator’s Guide 110

Page 113: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

Using SQL Server availability groups with multi-subnet failover for audit store databases

If you add an audit store database to a SQL Server availability group that has multiple subnet failover functionality, the SQL Server that hosts the management database must be SQL Server 2012 or above. This restriction applies only to availability groups that have multi-subnet failover configured.

For details about availability group multi-subnet failovers, see https://msdn.microsoft.com/en-us/library/hh213417.aspx#SupportAgMultiSubnetFailover.

Adding new audit store databases to an installation

When you first set up an installation, you also create the first audit store and audit store database. By default, that first database is the active database. As you begin collecting audit data, you might want to add databases to the audit store to support a rolling data retention policy and to prevent any one database from becoming a bottleneck and degrading performance.

Only one database can be the active database in an audit store at any given time. The computer hosting the active database should be optimized for read/write performance. As you add databases, you can change the older database from active to attached. Attached databases are only used for querying stored information and can use lower cost storage options.

Note A single instance of Microsoft SQL Server can host multiple databases. Those databases can support different versions of the agent.

Audit store databases have the following characteristics:

A database can be active, attached, or detached.

Only one database can be actively receiving audit data from collectors.

A database cannot be detached while it is the active database.

Chapter 4 • Managing an installation 111

Page 114: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

A database that was previously the active database cannot again be the active database.

If a detached database contains parts of sessions presented to the Audit Analyzer, a warning is displayed when the auditor replays those sessions.

Rotating the active database

Database rotation is a management policy to help you control the size of the audit store database and the performance of database operations. There are several reasons to do database rotation:

It is more difficult to manage one large database than multiple small databases.

Performance is better with multiple small databases.

Backing up, restoring, archiving, and deleting data all take significantly more time if you work with one large database.

Database operations take very little time when you work with multiple small databases.

For auditing, you can implement a database rotation policy by having the collector write data to a new database after a certain period of time. For example, the collector in site A writes data to the database siteA-2015-11 in November, then write data to database siteA-2015-12 in December and to the database siteA-2016-01 in January. By rotating from one active database to another, each database stays more compact and manageable.

Creating a new database for rotation

You can rotate from one active database to another at any time using the Audit Manager console.

To create a new database for rotation:

1 Open Audit Manager.

2 Expand the installation node, then expand Audit Stores and a specific audit store name.

Auditing Administrator’s Guide 112

Page 115: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

3 Select Databases, right-click, then select Add Audit Store Database to create a new database.

Note For details on setting up the database, see “Create the first audit store database” on page 55.

4 Select the Set as Active database option so collectors start writing to the newly created database.

You can also use Centrify application programming interfaces (APIs) to write a script that automates the database rotation process. For API details and sample code, see the Centrify SDK documentation.

Database archiving

To implement periodic archiving, add a new active database, leave one or more previous databases attached, and take the oldest database off-line for archiving.

Queries during rotation and archiving

If the database backup program supports online backups, the Audit Analyzer can still query the database while the backup is in progress. However, the backup program may block updates to the session review status. If the backup program does not support online backup, the database will be offline until the backup is complete.

Database backups

You can back up a database whether it is attached to the audit store or detached from the audit store.

Reattaching a restored backup of a database

If you need to query sessions from an older database that is offline and detached, you can restore the database from a backup and reattach it to your auditing installation. You might need to do this is your auditing installation is large, you do frequent database rotation, and you don’t keep many databases attached and online.

Chapter 4 • Managing an installation 113

Page 116: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

Understand that after you restore a database from a backup, you need to fix a couple of settings in the database before you can reattach it to your auditing installation. During the backup operation, the database owner and trustworthy properties get set in such a way that prevents you from reattaching the database to your auditing installation unless you fix these properties.

To reattach a restored database to your auditing installation:

1 Run the following command to reset the database owner to [sa]:ALTER AUTHORIZATION ON DATABASE::<db_name> TO [sa]

2 Run the following command to reset the trustworthy property:ALTER DATABASE <db_name> SET TRUSTWORTHY ON

You can now reattach the database to your auditing installation.

Allowed incoming accounts

You can specify the accounts that are allowed to access the audit store database. By configuring these accounts, you can control which collector computers can connect to the audit store database and which management databases have access to the data stored in the audit store database.

Your account must have Manage SQL Login permission to configure the incoming accounts.

To configure allowed accounts:

1 Open Audit Manager.

2 Expand the installation node, then expand Audit Stores and select a specific audit store name.

3 Select a database under the audit store, right-click, then select Properties.

4 Click the Advanced tab.

Auditing Administrator’s Guide 114

Page 117: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

5 Click Add to add a collector or management database account. For example:

6 Select an authentication type.

If you select Windows authentication, you can browse to select a computer, user, or group to add.

If you select SQL Server authentication, you can select an existing SQL Server login or create a new login.

Connections should use Windows authentication whenever possible. However, computers in an untrusted forest cannot connect to an audit management database using Windows authentication. To allow connections from an untrusted forest, add a SQL Server login account as the incoming account for the management database.

Detecting data tampering and verifying session integrity

When you create your audit store database, you have the option to enable data integrity checking. Data integrity checking provides the ability to detect if auditing data has been tampered with.

Chapter 4 • Managing an installation 115

Page 118: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit store databases

For example, data integrity checking can detect if a user who has write privileges over the Audit Store database directly manipulates the audited session data by making a direct connection to the Microsoft SQL Server database.

Session data that is stored in audit store databases is typically accessible to database administrators and/or database owners in an unrestricted fashion. For these users with write privileges on the audit store database, it’s fairly easy to tamper with data in such a way that it can help manipulate the outcome of an AQL query.

For example, someone could change the searchable tags in such a way so that the session is never returned by a query. Or, someone could remove suspicious activity from a recorded session, such as by changing the list of commands that are executed or changing the command output.

Note Data integrity checking cannot detect tampering if a database administrator deletes an entire session or database. Also, data integrity checking is not yet available for audit trail events.

Once you enable data integrity checking, you can do the following:

Use the Audit Analyzer console or a PowerShell cmdlet to check the integrity of audited sessions.

Determine if any data in the following tables has been modified and where it was modified:

Session

RawData

Command

SyscallCommand

SyscallFilemon

WashData

WashEvent

Determine if any database rows belonging to an audited session were permanently deleted.

Auditing Administrator’s Guide 116

Page 119: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit stores

If you have not enabled an audit store database for data integrity checking and you try to check session integrity in Audit Analyzer, an error message appears.

Managing audit storesAn audit store is a collection of databases that contain audit data. All attached databases in the audit store are available to the audit management database. Typically each site has one audit store, but you can add audit stores as required for large or multi-site installations. For details, see “Adding more audit stores to an installation” on page 119.

Configuring audit store scope

The scope of an audit store defines which audited computers send their audit data to the audit store, and which collectors are assigned to the audit store. The scope is a set of Active Directory sites and/or subnets. To configure the scope for an audit store, open its Properties page and select the Scope tab. To add a site, click Add Site and select the site from the list. To add a subnet, click Add Subnet and type a subnet address and mask.

Configuring permissions for an audit store

To configure audit store security, open the audit store’s Properties page and select the Security tab.

Only users with Change Permission permission on the audit store are allowed to modify the user rights on the Security tab of the audit store’s Properties page.

The following table lists the rights that can be granted to active Directory users or groups, and the operations that the users granted such rights (“trustees”) are allowed to perform.

Chapter 4 • Managing an installation 117

Page 120: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit stores

The audit store administrator by definition has all of these user rights (Full Control).

User Right Allowed Operations

Full Control • All of the operations listed in the following rows of this table

Change Permissions • Modify permissions on this audit store

Modify Name • Modify display name for this audit store

Manage Scopes • Add a subnet or active Directory site

• Remove a subnet or active Directory site

Manage SQL Logins • Set the allowed incoming accounts for this audit store’s databases

• Set the allowed incoming accounts for collectors

Manage collectors • Enable collector trusted group for this audit store

• Add collector to the trusted collector group in this audit store

• Remove collector from the trusted collector group in this audit store

• Remove disconnected collector record from this audit store

Manage Audited Systems

• Enable audited computers trusted group for this audit store

• Add audited computer to the trusted audited computer group in this audit store

• Remove audited computer from the trusted audited computer list in this audit store

• Remove disconnected audited computer record from this audit store

Auditing Administrator’s Guide 118

Page 121: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit stores

Adding more audit stores to an installation

The audit store typically maps one-to-one with an Active Directory site. However, in some situations it is desirable to define the scope of an audit store differently:

A subnet that Active Directory considers part of a site may be connected over a slow link. In this situation, you probably want to configure another audit store and collectors that service audited computers in the remote subnet.

A very large site may require multiple audit stores for load distribution. You can accomplish this by partitioning an Active Directory site into multiple audit stores based on subnets. Each subnet has its own audit store and set of collectors and audited computers.

Manage Databases • Add audit store database to this audit store

• Attach audit store database to this audit store

• Detach an audit store database from this audit store

• Change active database in this audit store

• Modify the display name of a version 2 audit store database

Manage Database Trace

• Enable or disable database trace

• Export database trace

User Right Allowed Operations

Chapter 4 • Managing an installation 119

Page 122: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing the audit management database

Two common audit store actions are:

Adding a new audit store in a new site, and using the Select Scope page in the Add Audit Store Wizard to configure the site settings.

Splitting an audit store in two, using the audit store’s Property page to adjust the scope of the existing audit store, and then adding a new audit store.

To configure the audit store to support a particular subnet, click the Subnet radio button, and fill in the subnet IP address and mask.

Managing the audit management databaseThe audit management database keeps track of where components are installed and information about the installation. To connect to the database or manage its properties, select a specific installation name in Audit Manager, right-click, then select Management Databases. From this dialog box, you can view information about the current audit management database, remove or connect to a management database, or change the properties for a management database.

Auditing Administrator’s Guide 120

Page 123: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing the audit management database

Configuring audit management database scope

Select the audit management database you want to configure, then click Properties. From the Properties, click the Scope tab to configure audit management database scope. Click Add Site if you want to add a new Active Directory site to the management database or click Add Subnets to add a subnet for the management database to serve. Select the site or subnet from the list of sites or subnets found, then click OK. You can add or remove sites and subnets from the management database at any time using the Scope tab.

Note All components use Windows authentication whenever possible. However, an audit management database in another forest cannot connect to an audit store database using Windows authentication.

Setting audit management database security

Select the audit management database you want to configure, then click Properties. From the Properties, click the Security tab to configure security settings for the management database. Click Add page to add groups or users to the list of trustees who can manage, modify, or remove installation-wide components. Type all or part of the user or group name, select the appropriate user or group from the results, then click OK.

Select the appropriate rights you want to grant to the selected Active Directory users or groups, and the operations that the users granted such rights (“trustees”) are allowed to perform.

Select this right To grant permission for these operations

Full Control • All of the operations listed in the following rows of this table.

Change Permissions • Modify permissions on this audit management database.

Modify Name • Modify display name for this audit management database.

Manage Sites • Add a subnet or Active Directory site.

• Remove a subnet or Active Directory site.

Chapter 4 • Managing an installation 121

Page 124: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing the audit management database

Only users with Change Permission permission on the audit management database can modify the user rights on the Security tab. By definition, the management database administrator has Full Control over all of the user rights and is an allowed incoming user.

Configuring the maximum memory for the management database

Because SQL Server dynamically acquires memory whenever it needs it until it reaches the maximum server memory you have configured, you should set constraints on how much physical memory it should be allowed to consume. You can use the formula described in “Configuring the maximum memory for audit store databases” on page 107 to determine the maximum memory you should allow for the Microsoft SQL Server instances hosting the management database.

For more information about how to configure Microsoft SQL Server maximum memory setting and other memory options, see the following Microsoft article:

http://msdn.microsoft.com/en-us/library/ms178067(v=sql.105).aspx

Remove Database • Remove this audit management database from the installation.

Manage SQL Logins • Set the allowed incoming accounts for this audit management database.

• Set the outgoing account for this audit management database.

Manage Database Trace

• Enable or disable database trace

• Export database trace

Select this right To grant permission for these operations

Auditing Administrator’s Guide 122

Page 125: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Maintaining database indexes

Removing an audit management database

Select a specific installation name in Audit Manager, right-click, then select Management Databases. Select the audit management database you want to remove, then click Remove.

Because it is not recommended that you have multiple management databases in a single installation, you ordinarily would not separately remove an audit management database, but rather remove it as part of deleting an installation.

Maintaining database indexesTo ensure better performance and prevent database corruption, Centrify recommends you rebuild the database indexes for all the audit store databases and the management database as a regularly scheduled task that your run at least once a week. Rebuilding the indexes is especially important for the active audit store database to reduce fragmentation, but as a best practice you should rebuild indexes for all attached databases and the management database.

The following sample SQL statements illustrate how to rebuild all indexes on all the databases in one script:

=== BEGIN SQL statements ===DECLARE @Database NVARCHAR(128) DECLARE @Table NVARCHAR(128) DECLARE @Command NVARCHAR(500)

-- To skip index rebuilding for a database, add its name to the list belowDECLARE DatabaseCursor CURSOR FOR SELECT name FROM master.dbo.sysdatabases WHERE name NOT IN ('master','msdb','tempdb','model')ORDER BY 1

OPEN DatabaseCursor FETCH NEXT FROM DatabaseCursor INTO @Database WHILE @@FETCH_STATUS = 0 BEGIN PRINT 'Processing database ' + @Database

Chapter 4 • Managing an installation 123

Page 126: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing collectors

SET @Command = 'DECLARE TableCursor CURSOR FOR SELECT ''['' + TABLE_CATALOG + ''].['' + TABLE_SCHEMA + ''].['' + TABLE_NAME + '']'' as TableName FROM [' + @Database +

'].INFORMATION_SCHEMA.TABLES WHERE TABLE_TYPE = ''BASE TABLE''' EXEC (@Command) OPEN TableCursor

FETCH NEXT FROM TableCursor INTO @Table WHILE @@FETCH_STATUS = 0 BEGIN PRINT 'Rebuilding all indexes on ' + @TableSET @Command = 'ALTER INDEX ALL ON ' + @Table + ' REBUILD'EXEC (@Command)

FETCH NEXT FROM TableCursor INTO @Table END

CLOSE TableCursor DEALLOCATE TableCursor

FETCH NEXT FROM DatabaseCursor INTO @Database END CLOSE DatabaseCursor DEALLOCATE DatabaseCursor=== END SQL statements ===

Managing collectorsYou can select the Collector node in Audit Manager to view details about each collector you have added to the installation. You can then expand the Collectors node and select an individual collector in the left pane to display information about the audited computers that send sessions to that collector in the right pane.

Auditing Administrator’s Guide 124

Page 127: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing collectors

The following table describes the columns available in the right pane for collectors.

Column name Description

Collector Name of the collector

IP Address Location of the collector on the network

Status Whether the collector is disconnected from or connected to the audit store.

If a collector has never been successfully assigned to an audit store, it is not even shown in the left-pane list.

Uptime How long a connected collector has been running since it was last booted

Last Update Time The date and time of the last update received by the collector.

Port Number The port through which the collector communicates with its assigned audited computers and audit store. Default is 5063.

Audit Store The audit store to which this collector is assigned

Audit Store Database

The active database to which the collector is currently sending audit data

Connected Machines

The number of audited computers currently connected to this collector.

Because agents can communicate with a collector only if the agents and collector are in the same Active Directory forest, this column only includes audited computers that are in the same forest as the collector.

Chapter 4 • Managing an installation 125

Page 128: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing collectors

Monitoring collector status

The Collector Control Panel is available from the Start menu on any Windows computer on which you have installed a collector.

The Collector Control Panel enables you to monitor the local collector by giving you an overview of collector connectivity and status, including the collector’s current installation, audit store, audit store database, port number, and service status. To change the collector’s port number, installation, or authentication, click Configure. If you change the collector configuration, it might take a minute for the change to be reflected in the Collector Control Panel.

You can also use the Collector Control Panel to start, stop, or restart the collector service, and to generate more detailed information about the status of the collector. To see detailed information about the installation, audit store, audit store database, trusted agents, and connectivity between components, click the Troubleshooting tab, then click Diagnostics. The collector will generate a report and display the information in a separate window.

Modifying the command prompt recognized by the collector

For the collector to identify the command events executed in a session, it must also be able to identify the command prompt. Although there are several characters that are commonly used and recognized by default, most computers also allow you to customize the command prompt. If a customized command prompt is not detected by the

Disconnected Machines

The number of audited computers of which the collector is aware but that are not currently connected to this collector.

Note that the collector is only aware of audited computers that were at one time connected to it.

Collector Version The version of the collector software installed on the computer.

Column name Description

Auditing Administrator’s Guide 126

Page 129: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing collectors

collector, commands will not be displayed properly in the session Events list, making it difficult for auditors to see the commands executed in a selected session.

To enable the collector to detect custom or unusual command prompts, you can add a registry key on the computer where the collector is installed and specify a text string or a regular expression that will match the command prompt.

To specify a regular expression for the command prompt:

1 Log on to the computer where the collector component is installed and running.

2 Open the Registry Editor.

3 Expand the HKEY_LOCAL_MACHINE > SOFTWARE > Centrify > DirectAudit registry.

4 Select the Collector component, right-click, then select String Value.

5 Type Prompt as the new key name.

6 Select the new Prompt key, right-click, then select Modify.

7 Type a text string or regular expression that will enable the collector to identify the command prompt you are using on computers you are auditing.

If you don’t define a registry value, the default regular expression ^[^#%>\$]*[#%>\$]\s* is used to detect the command prompt.

Removing collectors

If you want to remove a collector, go to the Suite Installer and select the collector. The Collector Setup wizard Welcome page appears.

Because a collector is present on the computer, the next page enables you to select Change, Repair, or Remove the collector. Click Remove.

Chapter 4 • Managing an installation 127

Page 130: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audited computers and agents

Managing audited computers and agentsYou can monitor agent status from the Audit Manager console. With audited computers selected in the left pane, Audit Manager displays the name and IP address for audited computers, whether the agent is currently connected or disconnected, and how long the agent has been running since last restarted. You can also see the collector to which the agent is sending data, the audit store and audit store database where the audit data is stored, and the version of the agent software installed on the computer.

Monitoring agent status

You can use the dainfo -d command on audited Linux and UNIX computers to view information about the configuration, connectivity, and auditing status of the agent.

Configuring the UNIX agent off-line database

If the UNIX agent is unable to connect to a collector, it spools the session data to local storage. When a collector becomes available, it then sends the spooled data to that collector.

By default, the minimum amount of allocated disk space that must be available to the offline database before spooling stops and warnings are posted to the agent error log is 10%. You can change this percentage by assigning a different value to spool.diskspace.min in the /etc/centrifyda/centrifyda.conf file. For example, to change the minimum to 15%, set the following value:

spool.diskspace.min: 15

If the threshold is reached and a collector is still not available, the agent stops spooling data, and further audit data is lost. If this happens frequently or unexpectedly, you may want to increase the disk space allocation.

Auditing Administrator’s Guide 128

Page 131: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Delegating administrative permissions

Removing an audited computer

If an audited computer has been removed from the audit installation, the audited computer will continue to be listed on the Audit Manager as Disconnected. To remove the decommissioned audited computer, select Delete from its context menu.

Delegating administrative permissionsYou can facilitate the administration of a large installation by delegating tasks and, if needed, setting up additional Audit Manager consoles.

Whoever creates the installation is the first administrator in the system, with full control of the entire installation and the ability to delegate administration tasks to any Active Directory user or group. You can grant permissions to other users on the Security tab of the Properties page for each component.

Publishing installation information

Audit Manager publishes information about your installation to a service connection point (SCP) object in Active Directory so that audited computers and collectors can look up the information. If the published locations for multiple SCPs in the same installation are not in synch, or if agents cannot read from at least one of the published locations, the agents are unable to determine which audit store is the best match for the sites and subnets, and so they do not attempt to connect to an audit store.

Permission to publish to Active Directory

Only administrators who have been delegated permission to modify various attributes of the installation can publish those attributes to Active Directory.

If you do not have Active Directory permission to modify the installation, the updates are kept in the audit management database, and a message is issued to notify you that the installation information could not by updated in Active Directory.

Chapter 4 • Managing an installation 129

Page 132: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit roles

Synchronizing installation information

If you have an Active Directory account with permission to modify the installation, you can click Synchronize the Installation Properties page Publication tab to publish the information.

In a multi-forest or DMZ environment, this tab lists multiple Active Directory locations to which to publish.

Managing audit rolesBy default, each installation automatically has a Master Auditor role that has access to all audit data.The Master Auditor can read, replay, update review status, and delete all audit sessions in the installation. You cannot delete or change the permissions for the Master Auditor role itself. You can change the users or groups who are assigned to the Master Auditor role and the permissions granted to each role member, but you cannot make any other changes to this role. You can, however, create your own custom audit roles for the installation.

Creating custom audit roles

Audit roles allow specific auditors to search and replay specific sessions, review specific events, or generate reports using the Audit Analyzer console based on the criteria you define. Each role specifies the criteria to use, the users and groups that are assigned to the role, and the specific permissions those users and groups have been granted.

For example, you might specify the criteria for filtering sessions to be only the session activity recorded on a particular audited computer or all UNIX sessions recorded after a specific date and time.

The collection of auditors is identified by specifying either explicit auditors, or an Active Directory group of auditors. Using Active Directory groups is recommended because this puts all of a user's privileges under the common Active Directory infrastructure.

For each audit role, you can also configure the specific permissions granted to each member of the role. For example, some audit roles might permit auditors to read and replay sessions but not update the

Auditing Administrator’s Guide 130

Page 133: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit roles

status, add review comments, or delete the sessions to which they have access.

To create and assign audit roles:

1 Open Audit Manager and expand the audit installation to which you are connected.

2 Select Audit Roles, right-click, then select Add Audit Role.

3 Type a name and, optionally, a description of the audit role, then click Next.

4 Select the type of sessions—UNIX sessions, Windows sessions, or both UNIX and Windows sessions—to include for auditors assigned to this audit role, then click Add to specify filtering criteria for the role.

5 Select an attribute for filtering information from the list of Attributes.

For example, you can match sessions based on the period of time in which they were active, based on a specific state, or based on Active Directory group membership. You can also match sessions based on the specific activity that took place during the session. For example, you can find sessions where specific UNIX commands or Windows applications were used.

6 Select the appropriate criteria for the attribute you have selected, then click OK.

The specific selections you can make depend on the attribute selected. For example, if the attribute is Review Status, you can choose between “Equals” and “Not equals” and the specific review status you want to find, such as “To be Reviewed.” If you select the attribute Comment, you can specify “Contains any of” and type the text string that you want to find any part of. If you select the attribute Group, you can select “Is (exactly)” and the user principal name (UPN) of an Active Directory group, such as [email protected].

You can specify multiple attributes, by clicking Add and selecting additional attributes and criteria. You can test the filtering criteria you have added by clicking Execute Query and examining the results. When you have finished adding filters, click Next.

Chapter 4 • Managing an installation 131

Page 134: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit roles

7 Select the privileges for the audit role, then click Next.

8 Review your settings for the audit role, click Next, then click Finish.

You can assign users and groups to the audit role immediately by running the Assign users and Groups wizard or at a later time by right-clicking on the role name.

9 Type all or part of name to search for and select Active Directory users and groups to assign to the audit role.

Changing audit role properties

After creating an audit role, you can modify its properties.

To change properties for an audit role:

1 Open Audit Manager and expand the audit installation to which you are connected.

2 Expand Audit Roles, select an audit role name and right-click, then select Properties.

3 Click the General tab to change the name or description of an audit role.

4 Click the Access tab to change the filtering attributes and criteria an audit role.

5 Click the Privilege tab to change what members of the audit role can do with the sessions matching the criteria you specify.

6 Click the Security tab to change permissions for the audit role itself.

For example, you allow another user or group to change role membership for an audit role, you would click Security, then click Add to search for and select a user or group, the select the Change Role Membership permission to allow the selected user or group to modify the membership of the audit role.

Auditing Administrator’s Guide 132

Page 135: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing audit roles

Granting permissions to manage audit roles

Anyone you assign the Manage Audit Roles permission on an installation has full control over all of the audit roles for that installation. After you grant users or groups the Manage Audit Roles permission, they can create and remove roles, change the filtering criteria, modify audit role permissions for other users and group, and select the users or groups who are assigned to the role.

The following examples illustrate how users or groups granted the Manage Audit Roles permission might modify the audit roles for an installation:

Assign the Master Auditor role to other users and groups.

Create a UNIX Session Viewer role for UNIX auditors that allows them to view (read) UNIX sessions—but not replay, update, or delete—all UNIX sessions in the installation.

Create a Finance Managers role that includes both UNIX and Windows sessions filtered by the Active Directory group Finance Operators, so that users assigned to the Finance Managers audit role can read, replay, update, and delete all of the session activity generated by members of the Finance Operators group, but no other groups.

Create an audit role that enables investigators who are assigned to the role to read and replay only the activity captured when a specific command or application is used.

These are only a few examples of how you can use the Manage Audit Roles permission to define filtering criteria and privileges that control what different users or groups who are assigned to audit roles can see and do.

Chapter 4 • Managing an installation 133

Page 136: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 5

Querying and reviewing audited activity

This chapter describes how to use Audit Analyzer to find and review the audited sessions and audit trail events in which you are interested. If you are the Master Auditor or been assigned an audit role, you can use Audit Analyzer to create and store queries that retrieve information from one or more audit stores. When you locate sessions or events of interest, you can review a summary of activity, play back all or part of the session, mark the session for follow-up, or change the status of the session.

The following topics are covered:

Accessing audited sessions

Predefined queries for audit sessions

Predefined queries for audit events

Predefined queries for reports

Creating new session queries

Creating queries for audit events

Organizing queries in custom folders

Exporting and importing query definitions

Displaying session information

Changing the review status for audited sessions

Playing back a session

Exporting sessions

Deleting sessions

Viewing sessions outside of Audit Analyzer

134

Page 137: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Accessing audited sessions

Accessing audited sessionsYour access to audited sessions is controlled either through the audit roles you have been assigned, or through designation as a reviewer if you do not have an auditing role assigned to you. For more information on designating audit session reviewers, see “Adding session reviewers without designating auditing roles” on page 153.

If you have been assigned at least one audit role, or have been designated as a reviewer without an audit role, you can use Audit Analyzer to search for and replay the audited session activity collected from audited computers. Depending on the permissions defined for your audit role, you might also be able to annotate, update the status of, or delete the audited sessions to which you have access. If you have been designated as a reviewer of an audit session, you can only review and updated the status of the sessions to which you have access.

The first time you start Audit Analyzer, you are prompted to select an installation. If you have an audit role in that installation and the connection is successful, Audit Analyzer opens and displays the default categories for predefined queries:

Audit Sessions

Audit Events

Reports

Predefined queries for audit sessionsAudit Analyzer includes many predefined queries that you can use to find the sessions in which you are interested. To access the predefined queries, expand Audit Sessions. You can then select a predefined query to display a list of the audited sessions that meet the conditions of that query. For example, if you want to search for sessions by user, you can use the All, Grouped by User, then select the specific user whose sessions are of interest to see a list of all the sessions captured for that

Chapter 5 • Querying and reviewing audited activity 135

Page 138: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Predefined queries for audit sessions

user. For example, in the right pane, you would select a user from the list:

After you select the user, Audit Analyzer displays detailed information about each of that user’s sessions. For each session, Audit Analyzer lists the user name who started the session, the user display name, the account name used during the session, the name of the audited computer, the audit store where the session is stored, the start and end time for the session, current state, whether the audited session is a console or terminal client session, the review status of the session, any comments that have been added to the session, and the session size. For example:

Note that only completed sessions display the session size in Audit Analyzer.

Depending on the permissions associated with your audit role, you can right-click any session to view an indexed list of the activity captured, export the session activity to a comma-separated values file, update the review status for the session, or delete the session. If you have video capture auditing enabled for the installation, you can also select a session, right-click, then select Replay to review the session in the session player.

To view a description and definition for any predefined query, select the query, right-click, then select Properties. You can also export the

Auditing Administrator’s Guide 136

Page 139: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Predefined queries for audit events

query definition or the results from a query and perform other tasks on predefined queries. To perform any of these additional tasks, select the predefined query, right-click, then select the action you want to take.

Predefined queries for audit eventsAudit Analyzer includes predefined queries that you can use to find the sessions that recorded audit trail events. To access the predefined queries for locating audit trail events, expand Audit Events. You can then select a predefined query to display a list of the audit trail events that meet the conditions of that query. You navigate to indexed lists of commands and events and replay sessions of interest for audit event queries in exactly the same way as audit session queries and you have the same options for viewing the activity captured. However, the details displayed for audit event queries are different from audit session queries.

For each event, Audit Analyzer lists the name of the user, the name of the audited computer, the time of the event, the event name and description, and whether access was successful.

Predefined queries for reportsAudit Analyzer includes predefined queries for generating reports. By default, the reports include information for all audited users, computers, and sessions. Select the type of report you are interested in generating, then specify additional criteria for filtering the report output. You can then save the modified report query or show the report.

If you click Show Report, the report is generated and displayed in a new window. You can then save the report as an HTML, PDF, CSV, or XML document.

User activity report

The default User Activity Report provides a detailed record of user actions for all audited users. The report includes the user name, the computer where the activity occurred, the time at which the activity

Chapter 5 • Querying and reviewing audited activity 137

Page 140: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Predefined queries for reports

occurred, and the event recorded. For example, if a user opened a Windows application or ran a UNIX command, the event would be recorded and included in the report you generate.

You should note that the User Activity Report does not include all desktop changes, such as navigation through directories using Windows Explorer. Instead, the report provides information about specific events. For example, the report will include information about when an application is opened, operations are performed, and when the application is closed. For more detailed information about user activity, you can enable video capture auditing for the installation and for specific desktops, applications, or commands using roles in Access Manager.

For information about enabling video capture auditing, see “Enabling or disabling video capture auditing” on page 99.

You can customize and filter the information included in a User Activity Report by specifying the query criteria and saving the report definition.

Privileged activity report

The default Privileged Activity Report provides a record of all actions taken with elevated privileges for all audited users and computers. The report includes the user name, the computer where the activity occurred, the time at which the activity occurred, and the event recorded. For example, if a user selected a role with administrative privileges, the event would be recorded and included in the report you generate.

You can customize and filter the information included in a Privileged Activity Report by specifying the query criteria and saving the report definition.

Centrify zone administration activity report

The default Centrify Zone Administration Activity Report provides a record of all zone-related administrative actions taken for all audited users and computers. The report includes the user name, the computer where the activity occurred, the time at which the activity occurred, and the event recorded. For example, if an administrator created a new zone or delegated a management task to another user

Auditing Administrator’s Guide 138

Page 141: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Predefined queries for reports

or group, the event would be recorded and included in the report you generate.

You can customize and filter the information included in a Centrify Zone Administration Activity Report by specifying the query criteria and saving the report definition.

Login by user report

The default Login By User Report provides a record of both successful and failed login attempts for all audited users, computers, and sessions. The report includes the user name, the computer where the user attempted to log on, the time of the login attempt, and whether access was granted.

You can customize and filter the information included in a Login By User Report by specifying the query criteria and saving the report definition.

Login by computer report

The default Login By Computer Report provides a record of both successful and failed login attempts for all audited users, computers, and sessions. The report includes the user name, the computer where the user attempted to log on, the time of the login attempt, and whether access was granted.

You can customize and filter the information included in a Login By Computer Report by specifying the query criteria and saving the report definition.

Authorization failure report

The default Authorization Failure Report provides a record of authorization failure events for all audited users, computers, and sessions. The report includes the user name, the computer where the user attempted to log on or use a role, the time of the attempt, and the reason the user was denied access.

Chapter 5 • Querying and reviewing audited activity 139

Page 142: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Predefined queries for reports

You can customize and filter the information included in a Authorization Failure Report by specifying the query criteria and saving the report definition.

Monitored execution report

If you have configured your auditing installation for advanced monitoring, then this Monitored Execution report shows the monitored commands being executed on the audited computers. This report includes information on commands that are run individually or as part of scripts. This report shows who ran one of the monitored commands even if that person is not an audited user.

The Monitored Execution report includes the user name, the computer where the commands were run, the time the command was run, the name of the command and the command arguments used, the process and parent process IDs, the “run as” user, the directory in which the command run, and whether the command was successful.

Note In the report, the Access Status column lists out whether the command was started successfully or not. This field does not describe whether the command completed successfully or not.

Note Advanced monitoring does not generate an audit trail event for commands for which you’ve enabled per-command auditing.

You can customize and filter the information included in a Monitored Execution report by specifying the query criteria and saving the report definition.

Detailed execution report

If you have configured your auditing installation to perform advanced monitoring, then this Detailed Execution report shows all of the commands being executed on the audited machines—including commands that are run as part of scripts or other commands.

The Detailed Execution report includes the user name, the computer where the activity occurred, the time at which the activity occurred, the command that was entered, the process and parent process IDs, the current directory, the actual command that was executed, the command arguments, the “run as” user, whether the command started

Auditing Administrator’s Guide 140

Page 143: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Predefined queries for reports

or not (access status), and any additional access status details (such as “permission denied” if the access status is “failed”).

Note In the report, the Access Status column lists out whether the command was started successfully or not. This field does not describe whether the command completed successfully or not.

Note Advanced monitoring does not generate an audit trail event for commands for which you’ve enabled per-command auditing.

You can customize and filter the information included in a Detailed Execution report by specifying the query criteria and saving the report definition.

File monitor report

If you have configured your auditing installation to perform advanced monitoring, the File Monitor report shows the sensitive files being modified by users on the audited machines. The File Monitor report includes any activity by any user (except root) in the following protected areas on audited machines:

/etc/

/var/centrify/

/var/centrifydc/

/var/centrifyda/

The report includes the user name, the computer where the activity occurred, the time at which the activity occurred, the filename, the current directory, the kind of file access was attempted, if the file access was successful or not, the command that was used, the process and parent process IDs, and the “run as” user.

Note If a monitored file is renamed, the report displays both the original and new filename. The order of filenames may differ slightly on each operating system.

MFA Failure Report

The default MFA Failure Report provides a record of multi-factor authentication (MFA) failure events for all audited users, computers,

Chapter 5 • Querying and reviewing audited activity 141

Page 144: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

and sessions. The report includes the user’s name, the computer where the user attempted to log on or use a role, the time of the attempt, and the reason that MFA authentication failed.

You can filter the information included in a MFA Failure Report by specifying the query criteria and saving the report definition.

Creating new session queriesYou can create your own queries from existing queries or based on the criteria you define. Depending on the type of information you want to define as search criteria and whether you want to make the queries private or public, there are different type of queries you can define.

To search for audited sessions, you can create:

Quick queries

Private queries

Shared queries

If you create a quick, private, or shared query, a new node is added to the Audit Analyzer console for that type of query under the Audit Sessions node. If you want to search for audit trail events, you can also create queries for audit events, which are added to Audit Analyzer under the Audit Events node.

Creating a new quick query

A quick query is a full-text search of the audit store database for a simple string or keyword. With a quick query, you can start typing the search string and see a list of potential matches from which you can select an item to look for sessions that contain the item. You should use quick queries when you want to find sessions based on a simple text string, such as a captured input or output, or based on a particular attributes, such as a user name or application, rather than using complex expressions.

Auditing Administrator’s Guide 142

Page 145: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

To create a new quick query:

1 Open Audit Analyzer, select Audit Sessions, right-click, then select New Quick Query.

2 Type a search string into the search field.

As you type, the Quick Query displays a list of possible matches that start with the text you are typing. For example, if you start typing the string “da” as the search term, the Quick Query list displays captured commands such as dacontrol, dad, and dadebug as potential matches:

If a text string in the list is what you are looking for, select it. By default, the query will search for sessions that contain all of the text specified. If you want to search for any portion of the text specified, select Find sessions containing ANY instead of ALL of the search terms.

3 Click Find to display the matching logon sessions in the right pane.

Searching for a specific string

If you want to search for a specific string, you can enclose the command line string with quotation marks. For example, you can type “dacontrol -i” to only return sessions that captured dacontrol with the -i option. If you type the same search string without quotation marks and select Find sessions containing ANY instead of ALL of the search terms, the quick query will return sessions that include dacontrol with and without the -i option.

The quick query uses SQL Server full text search.

The list of potential matches can include captured input and output, application names, user names, computer names, time stamps, and any other information stored in the audit store database.

Chapter 5 • Querying and reviewing audited activity 143

Page 146: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

Modifying a quick query

You can edit a quick query by selecting the query in the left pane, right-clicking, then selecting Properties. You can change the name and add a description on the General tab. Click the Definition tab to change the query text.

Creating a new private query

A private query is a set of search criteria that you define for your own use. Private queries are only visible to the auditor who creates them. You create private queries by selecting options in Audit Analyzer dialog boxes. Your selections are translated into complex expressions in the SQL Server query language. You can also save any predefined or shared query as a private query if you want to modify an existing query for private use.

To create a new private query:

1 Open Audit Analyzer, select Audit Sessions, right-click, then select New Private Query.

2 Type a name and description for the query.

After you save the query, this information is available for viewing and editing on the General tab when you display the query’s properties.

3 Select the type of sessions that you want the query to find.

You can search for UNIX sessions, Windows sessions, or both UNIX and Windows sessions. By default, new queries search for both UNIX and Windows sessions.

4 Select an attribute for grouping query results, if applicable.

You can select one or more attributes for grouping query results. If you specify more than one attribute, results are displayed as nested groups according to the order in which you specified the attributes. For example, if you select audit store, then user, then date, the query results are grouped by audit store, then by user for each audit store, then by date for each user.

Auditing Administrator’s Guide 144

Page 147: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

5 Select an attribute for ordering query results within each group, if applicable.

You can select ascending or descending sort order for each attribute. For example, you might group query results by user name and set the sort order for user to ascending, but the sort order for time to descending.

6 Click Add to add search criteria to filter the results of the query.

7 Select an appropriate attribute from the Attribute list based on the sessions you want to find.

For example, you can search for sessions based on the period of time in which they were active or based on a specific state. You can also search for sessions based on the activity that took place during the session. For example, you can find sessions where specific UNIX commands or Windows applications were used.

8 Select the appropriate criteria for the attribute you have selected, then click OK.

The specific selections you can make depend on the attribute selected. For example, if the attribute is Review Status, you can choose between “Equals” and “Not equals” and the specific review status you want to find., such as “To be Reviewed.” If you select the attribute Comment, you can specify “Contains any of” and type the text string that you want to find any part of.

When creating queries for user names or computers, you might want to use the “Starts with” option. If you use the default to match “Is (exactly)”, you must include the fully qualified domain name of the user or computer.

Chapter 5 • Querying and reviewing audited activity 145

Page 148: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

9 Click Add to add another filter to the criteria for the query, or click OK to save the query and find the sessions that match the criteria you have specified.

Adding multiple filters to the query criteria

If you have more than one filter, different criteria attributes, such as Time and State, are separated by an implicit AND operation. Only sessions that match both criteria are returned. If you have repeated criteria attributes, for example, if you have two Time filters (time is not in past 10 days; time is in last month), the attributes are separated by an implicit OR operation. Sessions that match either criteria are returned.

Editing and removing filters from the query criteria

You can edit and remove any of the filters you specify. For example, if you are not finding the appropriate sessions, you might need to change or remove the criteria you have defined. After you have saved a query, you can right-click the query name, then select Properties to modify the query definition.

Auditing Administrator’s Guide 146

Page 149: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

Specifying command or application filters in the query criteria

When you specify criteria for commands, applications, or outputs, the entry field displays a list of possible matches from audited sessions based on the text you are typing. For example, if you select “Windows Applications” as the attribute and “Contains any of” and start typing “word” as the text string, the entry field displays a list of possible matches that contain “word” in the application name. You can select a potential match or continue typing to specify the application by its display name or the executable file name. For example, you can specify winword.exe, Microsoft Word, or both.

Creating a new shared query

A shared query is a set of search criteria that you define for other auditors to use. Shared queries are visible to the auditors you specify. Only the auditor who creates a query can grant permission to other auditors to use the query. You create shared queries by selecting options in Audit Analyzer dialog boxes in exactly the same way as you create private queries. Your selections are then translated into complex expressions in the SQL Server query language. You can also convert a private or quick query to a shared query.

To create a new shared query:

1 Open Audit Analyzer, select Audit Sessions, right-click, then select New Shared Query.

2 Type the query name and select the session type, grouping, ordering, and other criteria for the query.

If you need more information about specifying information for any field in the new query, press F1 to display context-sensitive help.

3 Click Add to add another filter to the criteria for the query, or click OK to save the query and find the sessions that match the criteria you have specified.

4 Expand Shared Queries, select the query name you specified in Step 2, right-click, then select Properties.

5 Click the Security tab.

6 Click Add.

Chapter 5 • Querying and reviewing audited activity 147

Page 150: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating new session queries

7 Type the user or group name to identify the auditors who should have permission to use this query, then click OK.

You can add multiple users or groups from the Select Users or Groups dialog box. You can also type part of the name, then click Check Names to look up user and group names.

8 Select each user or group, then select the appropriate permissions.

Searching for shared queries

After you publish queries and give other users permission to access them, other auditors can search for and select the shared queries they want to use. The shared queries are not automatically visible to users who have permission to use them.

To find shared queries you have permission to use:

1 Open Audit Analyzer, select Audit Sessions, right-click, then select Open Shared Queries.

2 Type the query name or click Show existing queries, then click Find Now.

3 Select one or more queries from the results returned, then click OK to add the query to your list of Shared Queries.

Auditing Administrator’s Guide 148

Page 151: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating queries for audit events

Creating queries for audit eventsIn addition to the predefined queries for audit events, you can create your own queries based on the criteria you define. Audit events are recorded for many activities, including both successful and failed operations. For example, you can search for events that are recorded when users attempt to log on and authentication fails or when users run commands or use applications with a role that grants elevated privileges. Audit trail events are also recorded when there are changes to the auditing infrastructure, and when there are changes to Centrify zones.

To specify the search criteria for a new audit event query:

1 Open Audit Analyzer, select Audit Events, right-click, then select Query Audit Events.

2 Type the query name and, optionally a description for the query.

3 Type a user name if you want to filter the event query by user name.

You can specify one or more user names in userPrincipalName format (user@domain). Use semi-colons (;) to separate multiple user names. For example, to limit the search for audit events to events recorded for actions taken by the users ben, maya, and fred, you could type the following:ben;maya;fred

4 Type a computer name if you want to filter the event query by computer.

You can specify multiple computer names separated by semi-colons.

5 Select the Event time option if you want to specify a time frame to filter the query based on when the event occurred.

If you select this option, you can search for events that occurred:

before, not before, after, not after, between, or not between specific dates and times.

in or not in the last specified number of days, hours, or minutes.

during the specified period of time.

Chapter 5 • Querying and reviewing audited activity 149

Page 152: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating queries for audit events

6 Select the Type option to search for events based on the type of activity performed.

If you select this option, you must click > to view and select the event categories in which you are interested. For details about the type of events recorded in each category, select the category and review the Description displayed for that category.

7 Select the Result option to search for events based on the result of the activity performed.

For example, you can use this option in combination with other options to search for only successful or failed operations.

8 Select the Role option, then a role name and zone if you want to filter the event query by role.

9 Select the Parameter option if you want to filter the query based on a specific parameter.

If you select this option, you must click > to view and select the event parameters that are currently available and in which you are interested.

10 Click OK to save and run the new query.

After you create a new query, you can export the query definition or its results, email it to others, or modify its properties.

How Access Manager roles affect audit trail events

If you only enable auditing without access control and privilege management features, audit trail events are recorded for all successful and failed operations on audited computers. The events are stored in the audit store database and can be returned in response to queries. These events are not associated with roles, so you should not use the Role filter in your query definition.

If you enable auditing with access control and privilege management, however, user activity is only recorded when a role with “auditing required” or “audit if possible” setting is used to perform one or more tasks. In most cases, roles that allow users to perform tasks using elevated privileges or in a restricted shell environment are configured with one of these audit settings. By default, the Windows Login and

Auditing Administrator’s Guide 150

Page 153: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Creating queries for audit events

UNIX Login roles are also configured to “audit if possible” to capture all audit trail events on the computers where the auditing service is running. If a role is configured with audit not requested or required, only audit trail events are recorded.

If the auditing service is running on the computer where the user logs on or where the administrative tasks are performed, the audit trail event is collected and transferred to the audit store database. Only the audit trail events that are captured and stored in the audit store database can be returned in response to audit event queries. Therefore, from Audit Analyzer, you can only query and report on audit trail events that are stored in the audit store database while a user performs tasks in an audited role on an audited computer.

Querying by audit event type or by role

In many cases, querying for audit trail events by event type produces more predictable results than querying for events by role. For example, to query for successful and failed login attempts, select Type, then select the Login Event category. In this particular case, the Windows Login and UNIX Login roles do not—as a user’s effective role—capture successful and failed login attempts, so they should not be used as filters for querying successful and failed login events.

If you query using the Role filter, Audit Analyzer only returns the audit trail events associated with the selected role. In some cases, this might be the information you are looking for—for example, to review the execution of commands using a role with elevated privileges. On UNIX computers, however, many audit trail events are not linked directly to the actions taken with a specific role. For example, on a Linux or UNIX computer with the auditing service running, many command-line activities record audit trail events. These events are stored in the audit store database and can be queried, but are not associated with any role and not reported if you select a role filter.

Populating and deleting the roles available

The list of roles available for querying is based on the roles you have defined using Access Manager. If you add a role definition, the new role displays in the list of roles when an audit trail about the role is generated.

Chapter 5 • Querying and reviewing audited activity 151

Page 154: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Organizing queries in custom folders

If you delete a role from all zones, however, it will remain in the list until the last session that has events associated with that role is deleted or the audit store database is detached.

Organizing queries in custom foldersBy default, queries are organized into folders by type. You can choose to organize your queries in other ways. For example, you can create a custom hierarchy of folders and move your queries into those folders. The folder information is stored locally and does not affect other auditors, so each auditor can have a private folder structure for favorite queries.

To create a custom folder hierarchy:

1 Open Audit Analyzer, select Audit Sessions, right-click, then select New Folder.

2 Select the new folder, right-click, then select Rename and type a new folder name.

3 Right-click the new top-level folder, then select New Folder to create sub-folders.

Exporting and importing query definitionsYou can export and import query definitions from one Audit Analyzer console to another to make queries available to different groups of auditors. You can also export query definitions for individual queries or for queries stored a custom folder hierarchy. For example, if you have a custom “Queries Required at All Sites” folder, you can select that folder and only export those query definitions.

To export query definitions:

1 Open Audit Analyzer, select the Audit Analyzer root node, right-click, then select Export Query Definitions.

2 Select a location and type a file name, then click Save.

All of the query definitions are saved to an xml file.

Auditing Administrator’s Guide 152

Page 155: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Displaying session information

To import query definitions:

1 Open Audit Analyzer, select the Audit Analyzer root node, right-click, then select Import Query Definitions.

2 Navigate to the location that contains the .xml file you want to import, then click Open.

The imported queries are created as private queries. If you have an audit role with Manage Shared Query privileges, you can publish the imported queries as shared queries.

Displaying session informationAfter you select a query to see a list of sessions, such as the Today query to see a list of today’s sessions or an individual user to see a list of sessions for that user, you can view an indexed list of the activity that took place during any of the individual UNIX or Windows sessions captured.

For example, you can select a Windows session, right-click, then select Indexed Event List to review a list of the applications that were opened during the session, in the order in which they were opened, the title of the active window, the type of activity, the desktop role used to access the application, and whether audit data was captured for the role being used. If you have video capture auditing enabled for the installation, you can replay the session entirely or from any point in the indexed list.

Similarly, for UNIX sessions, you can select a specific session, right-click, then select Indexed Command List to display a list of commands executed and the order they occurred. If you have video capture auditing enabled for the installation, you can replay the session entirely or from any point in the indexed list.

Adding session reviewers without designating auditing roles

If you have been assigned an auditing role that allows you to replay, delete, and update the status of an auditing session, you can also

Chapter 5 • Querying and reviewing audited activity 153

Page 156: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Changing the review status for audited sessions

designate users or groups the permission to replay and update the status of that session, even if they do not have an assigned auditing role.

Note Users and groups assigned as session reviewers cannot delete auditing sessions, and therefore cannot change the reviewer list for the sessions available to them.

To designate users or groups as reviewers of one or more auditing sessions:

1 In Audit Analyzer, select the session or sessions you want to be reviewed. You can do this by selecting the predefined groupings or by defining specific criteria using a query.

2 Right-click the selected sessions and select Set Reviewers.

3 Type all or part of the name of the user or group that you want to add to the list of reviewers and click Check Names.

If you would like to add multiple reviewers, separate the full or partial names by semicolons.

4 Click OK.

To remove reviewers from a session, right-click the session and select Clear Reviewers.

Changing the review status for audited sessionsYou can use the review status to keep track of audited sessions. For example, if you have a formal review process, you can change the state of sessions to indicate whether they are in the queue to be reviewed, have been reviewed, are awaiting some type of action, or should be deleted. For each change of state, you can add comments to more fully document what’s been done or if any follow-up by another auditor is required.

By default, all audited sessions start with a review status of None.

Auditing Administrator’s Guide 154

Page 157: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Changing the review status for audited sessions

To update the review status for a session:

1 Open Audit Analyzer and navigate to the session.

2 Select the session in the right pane, right-click, then select Update Review Status.

3 Select the appropriate new status.

For example, select To be Reviewed if the session requires a review or To be Deleted if the session has no activity requiring further review or data that must be retained.

4 Type any notes for yourself or other auditors in the Comments dialog box, then click OK.

Viewing status history

The changes you and other auditors make to the review status for a session are recorded and cumulative, so that you can view the complete status change history for any session.

To view the status change history for a session:

1 Open Audit Analyzer and navigate to the session.

2 Select the session in the right pane, right-click, then select Properties.

3 Click the Review Status tab.

Changes to the review status are listed with the most recent change at the top of the list and proceeding back in historical order. You can select any review status change in the list to see who made the change and any comments recorded when the change was made.

Adding comments to a session

The comments associated with a session are cumulative. For example, if you select To Be Reviewed and type a comment, then later change the state to Reviewed with another comment, both comments are displayed on the Comments tab if you view the session’s Properties.

Chapter 5 • Querying and reviewing audited activity 155

Page 158: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Playing back a session

You can also add comments to a session without changing its review status. To add comments to a session without changing the review status, right-click the session, select Properties, then click the Comments tab. You can use this tab to record detailed information about sessions of interest. You can also use the Review Status attribute to find sessions by review status, and the Comment attribute to find sessions by comment text.

Reviewing and deleting your own sessions

By default, you can update the review status, add comments, and delete your own sessions if you have an audit role with the appropriate permissions. However, there are installation-wide options to prevent any users from updating the review status or deleting their own sessions. These installation-wide options take precedence over your audit role permissions. Depending on how these options are set, you might be prevented from updating the review status and adding comments to your own sessions, prevented from deleting any of your own sessions, or prevented from both. If either installation-wide option is set, you might be blocked when you attempt to add a comment or delete a session.

Playing back a sessionIf you select the Enable video capture auditing option for an installation, you can replay session activity captured on audited Windows or UNIX computers. For Windows computers, the video record captures desktop activity when users select roles with auditing enabled. For UNIX sessions, the video record captures complete input and output typed in a UNIX shell during a session. If the Replay option is available for a session on the right-click menu, you can view a summary of the commands executed or applications opened in the session player. You can also search for commands, parameters, or events and control the playback speed and magnification from the session player.

To play back a session when video capture auditing is enabled:

1 Open Audit Analyzer and navigate to the session.

2 Select the session in the right pane, right-click, then select Replay to open the session player.

Auditing Administrator’s Guide 156

Page 159: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Playing back a session

The left pane of the session player displays a summary of activity similar to the indexed list. For example, if the session is a Windows session:

You can search on any column to find events of interest. If the session is a UNIX session, you can search the full session for any text string. For example, if you are playing a UNIX session, the right pane displays the shell session and a search field.

3 Click the Play/Pause icon ( ) at the bottom of the session player to start or stop the session you are viewing.

The current event displayed in the player is highlighted in the list of events

Chapter 5 • Querying and reviewing audited activity 157

Page 160: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Playing back a session

You can also fast forward session playback by clicking the Speed control icon to play back at 2x or 3x the normal speed. The dark blue playback line across the bottom of the window represents the total time of the session. You can drag the Timepoint needle to go directly to a specific point in the session.

The Real-time icon toggles to allow you to play back a session as it was recorded in real time or move swiftly from one user action to the next. The Session point in the lower right corner identifies the date and time of the current point in the session playback.

4 Close the session player.

Starting the session player separately

In most cases, you start the session player from Audit Analyzer. However, you can also start the session player from a Windows command prompt using standard Windows command line options or by specifying a Uniform Resource Identifier (URI).

Using Window command line options

If you use the Windows command line to start the session play, the installation name and session ID are required. The other arguments are optional.

daplayer /installation=installation_name /id=session_guid[/conn=auditserver_connection_string][/store=auditstore_ID][/time=timestamp]

For example:

daplayer.exe /installation=MyInstallation /id="{f533142a-d3e8-4b4a-ae9f-86ce156bdad0}" /store=1

If you don’t specify the audit server connection string, the session player attempts to bind to an appropriate audit management database. The session player can replay sessions from only one audit store, but the audit store ID is optional because sessions usually reside in a single audit store. An individual session can span multiple audit store databases within a single audit store. If a session spans multiple

Auditing Administrator’s Guide 158

Page 161: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Playing back a session

audit stores, that is, different subnets or sites, you should specify which audit store to play it from.

The timestamp option is a 32-bit integer that tells the session player to jump to the point where the event of interest occurred.

Using the Uniform Resource Identifier (URI)

The Uniform Resource Identifier identifies the session player, the installation name, and the session GUID for each session. This format is especially useful when used with the Copy Session URI menu item. The URI link can then be pasted into an email or instant messenger message. On a computer where Audit Analyzer is installed, the recipient can simply click on the URI link and the session player starts automatically.

Playing back a session from a web browser On computers that have Audit Analyzer installed, you can also play back sessions from a web browser. Because the cda:// protocol is automatically registered on the computer with Audit Analyzer, you can use a web browser to replay a specific session. If you want to play back a session from a web browser, you can extract the installation and session identifier from the session URI.

To get the installation and session identifier:

1 Select a session and right-click or open the session in the session player, then select File > Copy Session URI.

2 Open a text editor and paste the session URI into the file.

3 Delete the portion of the URI that identifies the player, so that only the installation and the object GUID remain.

For example, if the URI looks like this:rep://myInstallation/b62bc280-678c-439a-aec3-09a9b7ee4395

Remove the first part of the URI so that you only have the installation name and session identifier://myInstallation/b62bc280-678c-439a-aec3-09a9b7ee4395

To play back a specific session from a web browser:

1 Open a web browser.

Chapter 5 • Querying and reviewing audited activity 159

Page 162: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Exporting sessions

2 Type the installation name and session ID in the address bar of the web browser:cda://<installationName>/<session_id>

For example:cda://myInstallation/b62bc280-678c-439a-aec3-09a9b7ee4395

The session player opens and plays the specified session.

Exporting sessionsDepending on whether you have selected the Enable video capture auditing option for an installation, you might have different options for exporting session data to a file. The options available also depend on whether the session activity was captured on an audited Windows computer or an audited UNIX computer.

To view your export options, select the session and right-click or open the session in the session player, then click the File menu. Depending on the session type or installation settings, you might see the following export options:

Export to Command List Exports the time stamp and UNIX shell commands as comma separated values (csv) in a text file. The file contains the same information as displayed in the Indexed Command List for UNIX sessions.

Export to Event List Exports the time stamp, application name, and other details as separated values (csv) in a text file. The file contains the same information as displayed in the Indexed Event List for Windows sessions.

Copy Session URI Copies the URI of the selected session to the clipboard. You can then paste the URI into a web browser to open the session.

Check Session Data Integrity Checks the session for any possible data tampering. If the session is fine, a message displays that the data integrity check passed. If the session has been tampered with, a message displays with details of what data was affected.

Export to TXT Saves the selected UNIX session(s) or UNIX session(s) and user input (stdin) as a plain text file.

Auditing Administrator’s Guide 160

Page 163: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Deleting sessions

If you selected multiple sessions, a message displays that asks you if you want to export the multiple sessions to a single file. Click Yes to save the sessions in a single file or No to save the sessions in separate files.

If you select the Export Session with User Inputs option, user input is noted with a line number of K or “keyboard” input.

Export Detailed Executions Saves the session in HTML, PDF, CSV, or XML format if you have enabled advanced monitoring and the session includes any detailed executions.

Export to CDF Saves the selected Windows session in Computable Document Format. You can then open the CDF file with the session player (daplayer filename.cdf). Because the session player reads the session information directly from the CDF file, you don’t need to specify an installation name or connect to a database to replay the session.

Export to WMV Saves the selected session in Microsoft Windows Media Video format. You can use Windows Media Player or other media players to play back sessions in this format. However, sessions exported to WMV files do not include the summary information such as the user name, the computer name, start and end times, or the list of events captured.

Deleting sessionsAuditing allows you collect detailed information about activity in your organization. In some cases, however, you might have sessions that collect information that you are not interested in capturing or include information that you don’t want to store or make available to other auditors. For example, you might find there are sessions with very little activity or sessions that have been reviewed and are no longer needed. You might also notice that there are sessions that captured personally-identifying or medical data that other auditors should not be allowed to see. To handle these cases, you can selectively delete sessions from the audit store database.

In most cases, if you are the Master Auditor or have been granted permission to change the status of a session, you can mark sessions for deletion in Audit Analyzer. As noted in “Reviewing and deleting your own sessions” on page 156, however, you might be prevented from

Chapter 5 • Querying and reviewing audited activity 161

Page 164: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing sessions outside of Audit Analyzer

deleting your own sessions if the installation-level setting prevents users from deleting their own sessions.

To delete a specific session:

1 Open Audit Analyzer console, then use a predefined or custom query to find the sessions that you want to delete.

2 Select the sessions that you want to delete.

3 Right-click, then select Delete.

Audit Analyzer displays a confirmation message indicating that the deletion cannot be reversed.

4 Click Yes to continue.

To delete all sessions in a query:

1 Open Audit Analyzer, right-click a query node, then select Delete All Sessions.

Audit Analyzer prompts you to confirm the deletion of all sessions returned by the query.

2 Click Yes to continue.

Audit Analyzer prompts you to confirm the deletion of sessions with a review status of To be Reviewed or Pending for Action.

3 Click Yes to delete those sessions, or click No to continue the deletion of other sessions but preserve the sessions marked for retention.

While the delete operations runs, you can click Stop Delete if needed. Sessions are partially deleted up until the point where the delete operation was cancelled.

Viewing sessions outside of Audit AnalyzerYou can view audited sessions while working in other Centrify management consoles. For example, on computers that have Audit Analyzer and Access Manager installed, you can start the session player from Access Manager or from Active Directory Users and

Auditing Administrator’s Guide 162

Page 165: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing sessions outside of Audit Analyzer

Computers. You can also launch the session player by itself or from a web page or a software program.

Viewing sessions from Access Manager

On computers where both the Access Manager console and the Audit Analyzer console are installed, you can search for and view sessions directly from the Access Manager console.

To view audited sessions in Access Manager:

1 Navigate to a computer, user, or role assignments node in the left pane of Access Manager.

2 In the right pane, right-click the object and select View DirectAudit Sessions.

3 Specify any additional criteria, then click Find.

Viewing sessions in Active Directory Users and Computers

On computers where you have Active Directory Users and Computers with Access Manager properties and Audit Analyzer, you can view audited sessions directly from Active Directory Users and Computers.

To view audited sessions from Active Directory Users and Computers:

1 Navigate to the Users node in the left pane of the Active Directory Users and Computers.

2 In the right pane, right-click the user and select All Tasks > View DirectAudit Sessions.

3 Specify any additional criteria, then click Find.

Using Find Sessions

Find Sessions is a separate executable file, installed in the same directory as Audit Analyzer, that you can use to find and open audited sessions. The program provides a graphical user interface and a

Chapter 5 • Querying and reviewing audited activity 163

Page 166: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing sessions outside of Audit Analyzer

command line interface for specifying the search criteria. You can use either interface to find sessions of interest. From the Find Sessions graphical user interface, you can also replay, update the review status, view the desktops used for any sessions found, display the list of indexed commands or events, and copy the session URI.

To start Find Sessions from the Windows command line, you can type the following in a Command prompt window:

findsessions /ia

Specifying the sessions to find

You can use the Common or Advanced search criteria to find sessions of interest. The Find Sessions dialog box then displays the results that match the criteria you specify. In most cases, you can find the sessions you are interested in through some combination of user name, computer name, and session time displayed on the Common tab. If you want to specify additional criteria, such as review status or auditor name, you can click the Advanced tab.

Using the command line interface

You can run Find Sessions as a command line utility on computers where Audit Analyzer is installed. The command line interface can be useful, for example, if you may want to find, export, or delete sessions as part of a script. You can view usage information for the command line interface using the /help option. Specify search criteria for finding sessions using the following format:

findsessions /i=”InstallationName” /u=”username” /m=”computerName” /t=”yyyy-MM-dd”

Using a web browser to access sessions

On computers that have Audit Analyzer installed, you can also find and play back sessions from a web browser. Because the cda:// protocol is automatically registered on the computer with Audit Analyzer, you can use a web browser to open Find Sessions or to replay a specific session. For example, you can embed a cda:// link in a web page to automatically generate a list of sessions, or you might want to embed a link to a session or set of sessions in a web-based report or event notification.

Auditing Administrator’s Guide 164

Page 167: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing sessions outside of Audit Analyzer

You must be able to specify a query using AQL syntax to open Find Sessions from a web browser. If you want to start playing back a session from a web browser, you must know the session identifier. You can extract the session identifier from the session URI.

To start Find Sessions from a web browser:

1 Open a web browser.

2 Type the installation name and a search string using AQL syntax in the address bar of the web browser.

For example, if you want to search an installation named MyInstallation5 for sessions that involved the Administrator user, you would type the following in the address bar:cda://DefaultInstallation5/?search=\"1 user=\"Administrator*\"\"

3 Click Allow to open the Find Sessions with the Advanced tab displayed and “user=Administrator*” listed for the Define Criteria.

4 Click Find Now to find sessions matching the criteria you specified.

For more information about using Find Sessions, see the Find Sessions help.

Chapter 5 • Querying and reviewing audited activity 165

Page 168: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 6

Advanced monitoring

The Centrify Auditing and Monitoring Service captures input and output for audited users and commands and then uses this information to provide a history of executed commands.

However, you may want to gather additional information about which users and what programs are accessing or modifying production systems. For example, you may want to know when any user runs a highly privileged program, even if the user runs it from a script or by modifying system configuration files. You can use advanced monitoring to capture these kinds of activities.

One of the big differences in advanced monitoring is that you can track when any user performs a particular activity, not just an audited user.

Advanced monitoring uses the Linux system auditing tools to capture the following user and program activity:

Use case Where to review the user activity

Are audit trail events generated for this activity?

When any user executes a particular program, not just audited users.

• Audit Analyzer

• Linux agent syslog

• Monitored Execution report

• Monitored Execution List

yes

166

Page 169: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Set up advanced monitoring

Set up advanced monitoringTo configure advanced monitoring, make sure that your computer meets the requirements, make some configuration changes in the centrifyda.conf file, and then enable advanced monitoring either by using the dacontrol command or the “Enable Advanced Monitoring” group policy.

Advanced monitoring requirements Currently, Centrify supports only 64-bit Linux distributions from

RedHat (RHEL, Fedora, CentOS). For more information about supported platforms and versions, please refer to the current Centrify Auditing and Monitoring Service release notes.

Verify that you have the Linux audit package running. For example, run this command:rpm -qa audit

Ensure that the Linux audit package that you have is supported for use with Centrify Auditing and Monitoring Service. Version 1.2.8 or

When any user (not just audited users) attempts to modify system configuration files in monitored directories specified by an administrator.

• Audit Analyzer

• Linux agent syslog

• File Monitor report

yes

Which programs are executed in an audited session, regardless of how the program is invoked-- whether it’s run by way of a script, the use of a command alias, and so forth.

• Audit Analyzer

• Detailed Execution report

no - there would be too many events for the information to be useful.

Use case Where to review the user activity

Are audit trail events generated for this activity?

Chapter 6 • Advanced monitoring 167

Page 170: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Set up advanced monitoring

later of Linux audit package is required. However, Centrify Auditing and Monitoring Service prefers the Linux audit package version 2.4.5 or later because earlier versions may have issues with startup.

Ensure that your collector and audit store database are running Centrify Server Suite 2017 or 2017.1, or Centrify Infrastructure Services 2017.2 or later.

Configuring advanced monitoring

You have some options and choices as to how you configure advanced monitoring. To use any of these parameters, you must also enable advanced monitoring (by using the dareload -m command or the “Enable Advanced Monitoring” group policy). Here’s a list of the configuration parameters that you can edit in the centrifyda.conf file:

event.file.monitor

Use the event.file.monitor parameter to enable advanced monitoring for configuration files.

event.file.monitor.process.skiplist

For any areas that you’ve specified to monitor (using event.file.monitor), use the event.file.monitor.process.skiplist parameter to ignore any specific processes in those areas.

event.file.monitor.user.skiplist

Use the event.file.monitor.user.skiplist parameter to specify a list of users to exclude from advanced monitoring for files. For these users, the auditing service does not record any write access to directories specified in event.file.monitor.

event.execution.monitor

Use the event.execution.monitor parameter to monitor all programs that users run in an audited session.

event.monitor.commands

Use the event.monitor.commands parameter to specify a list of commands to monitor. Be sure to list each command using the full

Auditing with Centrify Server Suite Administrator’s Guide 168

Page 171: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using the advanced monitoring reports

path name of the command. The auditing service generates an audit trail event when a user runs any of these monitored commands, unless the user is listed in the event.monitor.commands.user.skiplist parameter.

event.monitor.commands.user.skiplist

Use the event.execution.monitor.user.skiplist parameter to specify a list of users to exclude from advanced monitoring for program execution. For these users, the auditing service does not record any programs that they run, even when the parameter event.execution.monitor is set to true.

After you make the configuration changes in the centrifyda.conf file, run the dareload -m command to apply the changes.

Enabling advanced monitoring

After you’ve made your configuration changes in the centrifyda.conf file, the next step is to enable advanced monitoring.

To enable advanced monitoring:

Run the following command:dacontrol -m

Or, use the Enable Advanced Monitoring group policy.

To disable advanced monitoring:

Run the following command:dacontrol -n

Or, discontinue using the Enable Advanced Monitoring group policy.

Using the advanced monitoring reportsThese reports provide details on what your advanced monitoring configuration has tracked:

Monitored execution report

Chapter 6 • Advanced monitoring 169

Page 172: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using the advanced monitoring reports

If you have configured your auditing installation for advanced monitoring, then this Monitored Execution Report provides a detailed record of the sessions where a user ran one of the commands that you’ve configured to monitor. This report shows who ran one of the monitored commands even if that person is not an audited user. Also, this report includes information on commands that are run individually or as part of scripts.

Detailed execution report

If you have configured your auditing installation to perform advanced monitoring, then this Detailed Execution report shows all of the commands being executed on the audited machines—including commands that are run as part of scripts or other commands.

File monitor report

The File Monitor report shows the sensitive files being modified by users on the audited machines. The File Monitor report includes any activity by any user (except root) in the following protected areas on audited computers:

/etc/

/var/centrifydc/

/var/centrifyda/

/var/centrify/

Auditing with Centrify Server Suite Administrator’s Guide 170

Page 173: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 7

Troubleshooting and common questions

This chapter describes how to view and manage log files and diagnostics for components of the auditing infrastructure on UNIX computers. This chapter also describes how to identify and resolve common problems you might encounter when auditing user activity or managing the auditing infrastructure.

The following topics are covered:

Checking the status of the UNIX agent

Starting and stopping the UNIX agent

Viewing and changing log file settings

Tracing database operations

Stopping auditing on a computer

Determining collector status and connectivity

Managing Microsoft SQL Server databases

Publishing installation information in Active Directory

Monitoring file system disk space usage

Checking the status of the UNIX agentAfter you install and enable auditing for a UNIX computer, you can check the status of the agent using the dainfo command to verify the connection to the correct installation. For example, the agent might not automatically connect to the installation if you use an installation name other than DefaultInstallation.

To check the status of the agent and the auditing infrastructure, run the following command as a user with root privileges:

dainfo --diag

171

Page 174: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Checking the status of the UNIX agent

The --diag option returns detailed information about the local computer and about the installations, audit stores, trusted collectors, trusted agents, and the active audit store database that the agent is sending its data to. The diagnostic output also includes details about the Active Directory location and object identifier for each installation.

Configuring the installation for an agent

If the command indicates that the status is offline or the installation is not configured, use dacontrol to explicitly identify the correct installation. For example:

dacontrol -i installation_name

You can then rerun dainfo --diag to verify the installation is configured correctly. Note that you cannot use dacontrol to connect to a different installation name if the installation is configured using the Installation group policy. In a secure installation, the Installation group policy identifies the Active Directory location that contains the service connection point object for the installation. If you are not using group policy to identify the installation, you can manually configure agents and collectors to use a specific installation name.

Checking for disconnected agents using Audit Manager

You can also use Audit Manager to see the status of all agents in the installation. If any agent is listed as Disconnected, you should check whether the audited computer is shut down, If the audited computer is not shut down, the agent might be outside the scope of any audit store or unable to find a collector. Use the diagnostic services to check communication between components.

Starting and stopping the UNIX agent

In most cases, the UNIX agent is automatically started when an audited computer is first powered on and remains running until the audited computer is shut down. Starting the agent when a computer starts up ensures the agent can capture activity for all shell sessions.

Auditing Administrator’s Guide 172

Page 175: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Checking the status of the UNIX agent

Although you typically start and stop the dad process as part of a computer’s startup and shutdown scripts, you can also start the agent directly from the command line on a local computer.

If the agent is not running, run the following command to start it:

/usr/share/centrifydc/bin/centrifyda start

Detecting the infrastructure services installation status

If you’re encountering any issues with your infrastructure services installation, you can run the dacheck program on your UNIX computers. The dacheck command detects the following errors in your infrastructure services installation:

Auditing binaries linkage problems

Disk space

DNS, collector, dad, adclient health

Logging status

Auditing file permissions/ownership

Auditing installation configuration

If ActiveDirectory joined

Auditing database integrity

If root in user.ignore and other criteria that affect root login

var/centrifyda, /tmp write permission

nsswitch.conf (or method.cfg, user.cfg for AIX)

Selinux status

Nscd (pwgrd) status

User's cdax/real shell existence, permission, ownership.

DNS Reverse lookup for collector's hostname

Report Domain Controller

Chapter 7 • Troubleshooting and common questions 173

Page 176: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing and changing log file settings

To check the status of the agent and the auditing infrastructure, run the following command as a user with root privileges:

dacheck

The dacheck command is available in the same location as the adcheck command: /usr/share/centrifydc/bin.

Viewing and changing log file settingsLog files are text files that record information about operations performed by auditing components on a local computer. If you have administrative privileges on a computer, you can open log files with any text editor.

You can view log files, change the location of the log file, and change the level of detail recorded in the log file from the Log Settings dialog box. Depending on the computer you are using, there are different ways to open the Log Settings.

Audit Manager By default, the log file for Audit Manager is located in the C:\Users\User\AppData\Roaming\Centrify\DirectAudit\Log directory. Select the Audit Manager top-level node, right-click, then select Log Settings to change the location or the level of detail recorded in the log file. By default, only error and warning messages are logged. You should only modify log settings if instructed to do so by Centrify Support.

Audit Analyzer By default, the log file for Centrify Audit Analyzer is located in the C:\Users\User\AppData\Roaming\Centrify\DirectAudit\Logs directory. Select the Audit Analyzer top-level node, right-click, then select Options to display the Log Settings tab. You can use the tab to change the location or the level of detail recorded in the log file. By default, only error and warning messages are logged. You should only modify log settings if instructed to do so by Centrify Support.

Audit Management Server By default, the log file for the audit management server is located in the C:\Program Files\Common Files\Centrify Shared\Log directory. You can open the Audit Management Server Control Panel, click the Troubleshooting tab, then click the Options to display Log Settings if you want to change the location or the level of detail recorded in the log file. By default, error,

Auditing Administrator’s Guide 174

Page 177: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing and changing log file settings

warning, and informational messages are logged. You should only modify log settings if instructed to do so by Centrify Support.

Collectors By default, the log file for the collector service is located in the C:\Program Files\Common Files\Centrify Shared\Log directory. You can open the Collector Control Panel, click the Troubleshooting tab, then click the Options to display Log Settings if you want to change the path to the log file or change the level of detail recorded in the log file. By default, error, warning, and informational messages are logged. You should only modify log settings if instructed to do so by Centrify Support.

Audited computers By default, the log file for the Centrify Agent for Windows is located in the C:\Program Files\Common Files\Centrify Shared\Log directory. You can open the auditing Agent Control Panel, click the Troubleshooting tab, the click Options to display Log Setting if you want to change the path to the log file or change the level of detail recorded in the log file. By default, error, warning, and informational messages are logged. You should only modify log settings if instructed to do so by Centrify Support. On UNIX computers, detailed logging is disabled by default. For information about enabling logging, see “Enabling detailed logging for Linux and UNIX computers” on page 175.

Note A list of auditing agent error codes is available in KB-7541 in the Centrify Knowledge Base.

Enabling detailed logging for Linux and UNIX computers

In most cases, troubleshooting auditing-related issues requires information about the operation of the agent, the collector service, and database activity. For performance reasons, you should only enable agent logging when you need to capture detailed information about agent operations. For troubleshooting purposes, however, you can use the dadebug command to turn on detailed logging.

To enable audit-related logging on audited Linux or UNIX computers:

1 Switch to the root user.

2 Run the dadebug clear command to remove any existing detailed logging from previous operations.

Chapter 7 • Troubleshooting and common questions 175

Page 178: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing and changing log file settings

dadebug clear

3 Run the dadebug on command to enable detailed logging on for audit-related agent operations.dadebug on

Detailed messages are recorded in the /var/log/centrifydc.log file. You can view the contents of the log file with a text editor. In most cases, however, you should collect additional information and send all of the logged information to Centrify Support.

4 Restart the auditing service./usr/share/centrifydc/bin/centrifyda restart

5 Run the dainfo diagnostic command and save the output to a text file.dainfo --diag > /tmp/dainfo.txt

6 Run the adinfo diagnostic command and save the output to a text file.adinfo --diag > /tmp/adinfo.txt

7 Stop detailed logging of audit-related activity.dadebug off

8 Send an email to Centrify Support with the log files and the agent configuration file as an attachment. /var/log/centrifydc.log/tmp/dainfo.txt/tmp/adinfo.txt/etc/centrifyda/centrifyda.conf

To check whether detailed logging is enabled:

1 Run dadebug without parameters to see if detailed logging is currently enabled.dadebugCentrify DirectAudit debug logging is on

2 Run addebug without parameters to see if detailed logging is currently enabled.addebug

3 Run addebug off to disable logging, if needed.

Auditing Administrator’s Guide 176

Page 179: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Viewing and changing log file settings

Enabling detailed logging for the collector service

If you are troubleshooting an auditing-related issue, you should enable detailed logging for the collector service on the computers where the collector service runs.

To enable detailed logging on a collector:

1 Log on to a computer with a collector service.

2 Click Start > All Programs > Centrify Infrastructure Services 2017 > Collector Control Panel to open the Collector Control Panel.

3 Click the Troubleshooting tab.

4 Click Options, change the logging level to Trace messages, then click Apply.

5 Note the log folder location or click Browse to specify a different location for the log file, then click OK.

6 Click View Log to view the current log file.

From the log file window, you can also click File > Save As to save the log file.

7 Click Close to close the Collector Control Panel.

8 Send an email to Centrify Support with the log file from the location specified in Step 5 as an attachment.

9 Open the Collector Control Panel, click the Troubleshooting tab, click Options, change the logging level back to its default setting of Informational messages, then click OK.

Enabling detailed logging for auditing consoles

In most cases, troubleshooting auditing-related issues requires information about the operation of the agent and the collector or database activity. However, in some cases, it might be necessary to capture detailed information about the operation of Audit Manager or Audit Analyzer.

Chapter 7 • Troubleshooting and common questions 177

Page 180: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Tracing database operations

To capture detailed information for Audit Manager:

1 Log on to a computer with the Audit Manager console.

2 Click Start > All Programs > Centrify Infrastructure Services 2017 > Audit Manager to open the Audit Manager console.

3 Select the Audit Manager node, right-click, then click Log Settings.

4 Change the logging level to Trace messages, then click Apply.

5 Note the log folder location or click Browse to specify a different location for the log file, then click OK.

6 Send an email to Centrify Support with the log file from the location specified in Step 5 as an attachment.

7 Right-click Audit Manager, click Log Settings, change the logging level back to its default setting of Warning messages, then click OK.

To capture detailed information for Audit Analyzer:

1 Log on to a computer with the Audit Analyzer console.

2 Click Start > All Programs > Centrify Infrastructure Services 2017 > Audit Analyzer to open the Audit Analyzer console.

3 Select the Audit Analyzer node, right-click, then click Options.

4 Change the logging level to Trace messages, then click Apply.

5 Note the log folder location or click Browse to specify a different location for the log file, then click OK.

6 Send an email to Centrify Support with the log file from the location specified in Step 5 as an attachment.

7 Right-click Audit Analyzer, click Options, change the logging level back to its default setting of Warning messages, then click OK.

Tracing database operationsDatabase traces are used to help diagnose problems in the management database or audit store databases. For example, database traces can help to identify inconsistencies caused by

Auditing Administrator’s Guide 178

Page 181: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Tracing database operations

hardware errors or network interruptions. After you enable database tracing, Audit Manager tracks all of the SQL statements and debug messages from the audit management database or audit store, and records the information in the database server.

Note Tracing database operations affects database performance. You should only activate a database trace if you require this information for troubleshooting. Before you start a database trace, try to reduce the load on the database instance as much as possible, then only perform the actions needed to reproduce the issue you are troubleshooting. Turn off database tracing as soon as you have logged the activity you need for the analysis of database operations. The trace for each database can take up to 800MB of server disk space. After you turn off database tracing, restart the SQL Server instance to reset the disk space.

Starting a database trace

You can start a database trace for a management database or an audit store database.

To start database tracing:

1 Open Audit Manager.

2 Select an installation name, right-click, then click Properties.

3 Click the Database Trace tab.

This tab displays basic information about the management databases and audit store databases for the selected installation. In the Trace Status column, you can see whether tracing is enabled or disabled for each database.

4 Select a management or audit store database in the list, then click Enable to start tracing on the database selected.

5 Click OK, then perform the database actions for which you want to capture information.

Chapter 7 • Troubleshooting and common questions 179

Page 182: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Tracing database operations

Stopping the database trace

You should turn off database tracing immediately after you have logged the activity you need for the analysis of database operations.

To stop database tracing:

1 Open Audit Manager.

2 Select the installation name, right-click, then click Properties.

3 Click the Database Trace tab.

4 Select the management or audit store database that has tracing enabled, then click Disable to stop tracing on the database selected.

5 Click Export to save the database trace from the selected databases to a file with comma-separated values (.csv).

6 Follow the prompts displayed in the Export Database Trace wizard to save the information to a file.

Exporting the database trace for a management database

The Export Database Trace wizard prompts you for different information depending on whether the database trace is for a management database or an audit store database. For example, if you generate a database trace for a management database then click Export, the Export Database Trace wizard prompts you for user accounts.

To export the database trace:

1 Select a start date and time for the From filter and an end date and time for the To filter, then click Next.

2 Click Add to search for and select users, then click Next.

By default, you can search for users in the entire directory, you can click Object Types or Locations to change the scope of the search scope, or click Advanced specify other criteria.

Auditing Administrator’s Guide 180

Page 183: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Tracing database operations

3 Accept the default folder location or click Browse to select a different location, then click Next.

4 Review your selections, then click Next.

By default, the wizard save the file as installation_name.csv and opens the file location.

5 Click Finish, then click OK to close the installation properties.

Exporting the database trace for audit store databases

When you select an audit store from the lower area of the Database Trace tab on the Properties page and click the lower Export button, the wizard opens with a date/time Export Criteria page. On the second page, the wizard asks you to pick the domain and computer.

To export the database trace:

1 Select a start date and time for the From filter and an end date and time for the To filter, then click Next.

2 Click Add to search for and select collectors, then click Next.

By default, you can search for computers in the entire directory, you can click Object Types or Locations to change the scope of the search scope, or click Advanced specify other criteria.

3 Click Add to search for and select management database computers, then click Next.

4 Accept the default folder location or click Browse to select a different location, then click Next.

5 Review your selections, then click Next.

By default, the wizard save the file as audit_store_name.csv and opens the file location.

6 Click Finish, then click OK to close the installation properties.

Chapter 7 • Troubleshooting and common questions 181

Page 184: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Stopping auditing on a computer

Delegating database trace management

You can delegate the authority to manage database tracing by granting the Manage Database Trace permission to other users for a management database or an audit store database.

Stopping auditing on a computerSeveral actions can directly or indirectly stop auditing on a computer. For example:

Someone powers down the audited computer.

Someone logs in on the audited computer and stops the agent.

The audited computer is moved to a different audit store, causing the initial audit store to consider the audited computer disconnected.

The administrator checks the Define trusted audited computer list on the Advanced tab of an Audit Store Properties page, and does not include the audited computer on that list.

Resuming auditing if the agent stops

If the dad service stops running for any reason, audited shell sessions will stop working and you will be prompted to resume or quit auditing. If you resume auditing, the cdawatch process attempts to start dad and connect to the installation. However, if you have manually stopped the dad process, for example by running /usr/share/centrifydc/bin/centrifyda stop, you must manually restart the agent.

If you decide to quit auditing when the dad service has stopped running, you are prompted to confirm that you want to terminate the session before the session ends.

Allowing users to log in when auditing is stopped

If auditing is required but the agent is not running, users might be prevented from logging in. You can log in as a user with root privileges

Auditing Administrator’s Guide 182

Page 185: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determining collector status and connectivity

and either restart the agent or temporarily disable auditing using dacontrol -d to allow users to log in.

You can also run dainfo --diag or check the log file to get more information. For example, if the adclient process is not running, you might be unable to restart auditing.

If you cannot immediately correct the problem, you can temporarily disable all auditing.

Determining collector status and connectivityYou can use the Collector Control Panel to generate a complete diagnostic check of the collector. The diagnostic report includes detailed information about the current status of the collector and the installation and audit store to which the collector sends data.

To generate diagnostics on a collector:

1 Log on to a computer with a collector service.

2 Click Start > All Programs > Centrify Infrastructure Services 2017 > Collector Control Panel to open the Collector Control Panel.

3 Click the Troubleshooting tab.

4 Click Diagnostics.

The results are displayed in a Diagnostic Information window. If connections are successful and components are configured correctly, you should see results similar to this:

Establishing connection with Collector: SuccessGetting collector's current status: RunningGetting Collector's current Installation: DefaultInstallation (locally configured)Getting Collector's current Audit Store: Data Source=DC2008r2-LG.pistolas.org\AUDITSITE;Initial Catalog=AuditStore-2013-04-23Machine IP address(es): 192.168.42.3Machine is joined to: pistolas.org

Chapter 7 • Troubleshooting and common questions 183

Page 186: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determining collector status and connectivity

Machine is in site: [email protected]: DefaultInstallation AD Object: pistolas.org/Program Data/Centrify/DirectAudit/Vegas-Installation-e8ba932d-cdba-4eef-b3ca-35ea6065eadb Object GUID: d3843175-c9df-4ad8-a134-8b2e7035507e Installation ID: 913843b4-9be1-4c14-b5eb-dc3ad9572994 Audit Stores: AuditStore Site(s): ([email protected]) Subnet(s): None configured Trusted Agents: None configured Trusted Collectors: None configured Audit Store Active Database: Data Source=DC2008r2-LG.pistolas.org\AUDITSITE Initial Catalog=AuditStore-2013-04-23 Pistolas AD Object: pistolas.org/Program Data/Centrify/DirectAudit/Vegas-Installation-44f3a0a7-2cfa-44b1-a125-3de7a358cd9f Object GUID: 183abdd9-e916-46ba-9595-d7d38bab60f9 Installation ID: 852443be-9d2e-4c67-85ed-bbadc2303101 Audit Stores:Machine's Installation: DefaultInstallation (locally configured)This machine's Audit Store is 'AuditStore', which services site '[email protected]'Attempting to connect to Audit Store: Data Source=DC2008r2-LG.pistolas.org\AUDITSITE Initial Catalog=AuditStore-2013-04-23 Integrated Security=TRUE Pooling=True Max Pool Size=300 Encrypt=True TrustServerCertificate=True

Auditing Administrator’s Guide 184

Page 187: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determining collector status and connectivity

Connected to Audit Store successfully

Done.

You can copy the results to a file and send them to Centrify Support for help.

Resolving connectivity issues between a collector and an audit store

If the diagnostic report or the Collector Configuration wizard indicates that the collector cannot connect to an audit store database, check the following:

Verify the account you logged in with has permission to add a collector.

Verify the collector service has permission to connect to the active audit store database. You can grant this permission from Audit Manager.

Check whether the SQL Server instance needs to be restarted. For example, make sure the SQL Server instance is not waiting for a restart to complete ASP.NET registration changes.

Check whether there is a firewall between the collector and the SQL Server instance blocking access.

Check whether SQL Server is configured to allow named pipes and TCP/IP connections.

Check whether SQL Server is configured to allow remote connections.

Compare the site or subnet that the collector is configured to use with the scope of the audit store. For example, make sure the audit store site or subnet matches the site or subnet in the audit store properties.AuditStore

Site(s): ([email protected]) Subnet(s): None configured

Chapter 7 • Troubleshooting and common questions 185

Page 188: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Determining collector status and connectivity

Resolving authentication issues

If you configure the collector service to use an Active Directory account instead of the local system account, you might encounter problems with Kerberos authentication when the collector attempts to connect to the audit store database. Kerberos authentication uses the service principal names (SPN) registered for the SQL Server account to authenticate a service. When the collector (client) wants to connect to SQL Server, it locates an instance of the service, composes an SPN for that instance, connects to the service, and presents the SPN for the service to authenticate. If the collector service account does not have any SPNs, the Kerberos authentication request fails.

To resolve this problem, go to KB-1311 in the Centrify Knowledge Base, select Attachments, and click View > Open > Run to run the checkspn.vbs script on a computer that is joined to Active Directory.

Note The user who is running this command must have permission to register the SPN on the service account.

By default, this script runs in report-only mode. It checks whether the required SPNs are present on the service account in question and issues a prompt to fix it, if not. This script registers the SPN in the service account servicePrincipalName attribute in the format:

MSSQLSvc/<FQDN>:<tcpport>

Monitoring collector performance counters

If you have enabled auditing and installed the collector service on a local Windows computer, you can add audit-specific performance counters to Performance Monitor to help you analyze and resolve audit-related issues. When you install the collector, the performance counters are added automatically, if you uninstall the collector, the counters are also automatically removed from Performance Monitor.

To add infrastructure services performance counters:

1 Log on to a computer with a collector service.

2 Click Start > Administrative Tools > Performance Monitor.

3 Expand Monitoring Tools and select Performance Monitor.

Auditing Administrator’s Guide 186

Page 189: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing Microsoft SQL Server databases

4 Click the green plus (+) icon in the toolbar.

5 Find the Audit Collector from the list, and expand it to show the list of available performance counters.

The performance counters generally fall into one of three categories; agent information, packet volume, and data loads. For example, if you add the counter # Connected Agent, you will be able to view the number of agents currently connected. If you add the counter # Unix Meta Message Packet, you will be able to view the number of Unix meta message packets. If you add the counter, Bytes Unix Command, you will be able to view Unix command data in bytes.

6 Choose the performance counter you would like to add and click Add.

7 Repeat Step 6 until you have added the counters you want to monitor.

8 Click OK.

Managing Microsoft SQL Server databasesManaging an audit installation requires permission to create new SQL Server databases on a SQL Server instance. In a production environment, this is an ongoing process to keep databases small and efficient. Because the management of the audit databases is not a one-time setup operation, Centrify recommends that you have at least one dedicated SQL Server instance for the audit administrator to use. The audit administrator should also be a member of the SQL Server system administrator role to ensure full control over the databases created and archived.

Selecting SQL Server or Windows authentication

When you configure the Microsoft SQL Server instance to use for auditing, you must specify the type of authentication to use. The appropriate type of authentication depends on how your production environment is configured. For example, if you have a firewall between

Chapter 7 • Troubleshooting and common questions 187

Page 190: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Managing Microsoft SQL Server databases

components or one-way trust relationship between forests, you must allow SQL Server authentications.

To support the auditing infrastructure, you can use the following types of authentication:

Windows authentication for creating new databases.

Windows authentication or both SQL Server authentication and Windows authentication for connections between collectors and audit stores.

Windows authentication or both SQL Server authentication and Windows authentication for connections between audit stores and the audit management database.

SQL Server authentication for collectors in an untrusted forest and an audit store in a trusted forest.

SQL Server authentication for audit store databases in a trusted forest and audit management database in an untrusted forest.

If you choose Windows authentication, you can perform actions with your own logon account or using another Windows account name and password.

Connecting to an installation or database

If you unable to connect to the SQL Server database, the problem might be caused by one of the following issues:

A firewall blocking access to the SQL Server instance.

TCP/IP has not been enabled for the SQL Server instance of SQL Server

Remote connections have not been enabled for the SQL Server instance.

For information about areas to check, see the following article:

http://blog.sqlauthority.com/2009/05/21/sql-server-fix-error-provider-named-pipes-provider-error-40-could-not-open-a-connection-to-sql-server-microsoft-sql-server-error/

Auditing Administrator’s Guide 188

Page 191: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Publishing installation information in Active Directory

Assigning the service principal name for SQL Server

If you get error messages when performing database operations, such as creating a new audit management database using Audit Manager, the problem is likely because the service principal name (SPN) for the SQL Server instance is assigned to the wrong Active Directory container.

If the SQL Server startup account is a local system account, the appropriate container is the computer name.

If it is any other account, the appropriate container is the SQL Server startup account.

Because authentication tries to use the first SPN it finds, make sure that no SPNs are assigned to inappropriate containers. Usually this error occurs when the administrator does not remove a manually added SPN from the Active Directory container after changing the SQL Server service account.

For help troubleshooting this problem, read the following article:

http://support.microsoft.com/kb/811889

Publishing installation information in Active Directory

The default location for publishing audit installation information in Active Directory is:

domain/Program Data/Centrify/DirectAudit

In most cases, this location is accessible to any administrative user. If you cannot access the publication location, check the following:

Make sure you have permission to publish information to Active Directory.

Verify that the publication location exists in Active Directory.

Check the network for problems.

Chapter 7 • Troubleshooting and common questions 189

Page 192: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Monitoring file system disk space usage

Moving a service connection point from its published location can result in connection problems. If you delete the default publication location and add a new publication location, you might not have permissions on the new location. If you do not have the appropriate permissions on the new location, ask the Active Directory administrator to grant you such permissions before running any of the wizards to reconfigure agents and collectors.

Note A new location might not be reflected immediately in the list current published locations. However, this has no any adverse effects apart from not being able to see the published location.

Monitoring file system disk space usageLike most software applications, Centrify agents require adequate disk space to be available to operate properly. For example, agents read and write temporary files to authenticate processes and ensure data integrity. If your operating system does not have enough disk space to accommodate these temporary files, the agent might be unable to run and prevent users from logging on or activity from being audited.

To prevent problems with disk space allocation, you should monitor key directories, such as the /tmp and /var directories, to ensure free space is available. The disk space required by different directories depends on the configuration and operating systems of the computer and the Active Directory environment. However, if any directory approaches 100% of its allocation, you should allocate more disk or remove older files to free up space for continued operation.

Auditing Administrator’s Guide 190

Page 193: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 8

Command line programs for managing audited sessions

This chapter provides an overview of the command line interface that you can use to manage audited computers. For complete reference information about the required and optional parameters for each command, see the man page provided locally on the Centrify-managed computer.

The following topics are covered:

How to use command line programs

Displaying usage information and man pages

Using commands for administrative tasks

How to use command line programsCommand-line programs allow you to perform administrative tasks directly from a UNIX shell or by using a shell script. These programs are installed when you install the Centrify UNIX agent, and are installed by default in the following directories:

/usr/sbin /usr/bin

You can use the UNIX command-line programs to take action directly on a local UNIX computer, for example to enable or disable auditing manually on a local computer. You can also use these programs to perform administrative or diagnostic tasks when it is more convenient to run them on the UNIX computer than through Audit Manager. For example, you might find it more convenient to view details about the agent configuration or diagnostic information directly on a local computer rather than through Audit Manager or the Agent Control Panel.

191

Page 194: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Displaying usage information and man pages

Displaying usage information and man pagesYou can display a summary of usage information for any UNIX command-line program by typing the command plus the --help or -h option. For example, to see the usage information for the dacontrol command:

dacontrol --help

For more complete information about any command, read the command’s man page. For example, to see the man page for the dacontrol command, type:

man dacontrol

Using commands for administrative tasksThe command-line programs allow you to perform administrative tasks—such as enable or disable shell auditing on UNIX computers or generate diagnostic information—directly on an audited computer. The following table provides a summary of the auditing-related programs installed with the Centrify UNIX agent. For complete

Auditing Administrator’s Guide 192

Page 195: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using commands for administrative tasks

information about the syntax and options for any command, see the man page for that command.

Use this command

To do this

dacheck The dacheck command performs operating system, network, and Active Directory tests to verify a computer meets the system requirements for a successful infrastructure services installation. For example, the install.sh script runs the dacheck program.

The dacheck command is located in the same place as the adcheck command: /usr/share/centrify/dc/bin.

dacontrol Enable or disable session or individual command auditing on a computer. You can also use this command to manually configure the audit installation to use for a local computer if you are not identifying the installation by group policy.

Only users with root privileges can run the dacontrol command.

dad Start the dad process manually.

The dad process records terminal activity on the UNIX computer and transfers the data to a collector. In most cases, it is automatically started when the computer is first booted. However, you can run this command to manually start the agent on a local computer.

Only users with root privileges can run the dad command.

dadebug Enable or disable logging for the dad process on an audited computer.

If you enable logging, the dad process writes messages to the /var/log/centrifydc.log file. If you run dadebug without specifying an option, the command returns a status message that indicates whether logging is currently enabled or disabled.

Only users with root privileges can run the dadebug command.

Chapter 8 • Command line programs for managing audited sessions 193

Page 196: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using commands for administrative tasks

dadiag Display detailed information about the configuration and current auditing status for a local computer.

This command displays the same information as dainfo --diag.

daflush Clear the auditing service in-memory cache of name service queries and installation information.

If you run this command without any arguments, it removes both auditing-related name service query results and audit installation information from the in-memory cache. If you run this command with no arguments or specify the --name-service option, the command also automatically clears the cache for common name services—such as nscd and pwgrd—if those services are running on the local computer.

Clearing the cache of name service query results is useful if you make changes that would affect the results of a name service query, and want to ensure you get updated information. For example, if you remove the UNIX Login role for an Active Directory user, some information for that user might remain in the auditing service cache and be returned when you run a command such as getent passwd for that user. You can run daflush to ensure the user is removed completely from the local computer cache, including the auditing service cache.

Only users with root privileges can run the daflush command.

dainfo Display detailed information about the status and configuration of an audited computer.

Use this command

To do this

Auditing Administrator’s Guide 194

Page 197: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using commands for administrative tasks

dareload Force the dad process to reload configuration properties from the /etc/centrifyda/centrifyda.conf file or the advanced monitoring properties from /etc/centrifyda/libaudit.conf. This command enables you to apply configuration changes without restarting the agent.

Only users with root privileges can run the dareload command.

dashellfix.sh Reset shells to their source shell on computers that are not being audited in an audited zone.

On audited computers, the cdash shell is used to capture and forward audit data instead of the original shell. This script enables you to restore the user’s original shell choice if the auditing service and wrapper shell are removed.

daspool Display information about the size and content of the auditing-related offline cache (spool) files.

If an audited computer cannot contact a collector service, it caches session, audit trail, and other information locally until a collector becomes available. This command enables you to review information about these offline cache files.

Only users with root privileges can run the daspool command.

Use this command

To do this

Chapter 8 • Command line programs for managing audited sessions 195

Page 198: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 9

Installing the UNIX agent on remote computers

In most cases, you install the UNIX agent locally on a computer using the install.sh script interactively. You can install the UNIX agent on remote computers using Deployment Manager, the install.sh script and a configuration file, or using virtually any software distribution or package installer program. This chapter provides an overview of these alternatives for installing the agent on UNIX or Linux computers.

The following topics are covered:

Deploying the agent from a Windows computer

Installing the agent silently using a configuration file

Using other programs to install the UNIX agent

Deploying the agent from a Windows computerIf you have Deployment Manager, you can deploy UNIX and Linux agents remotely from a Windows computer. Deployment Manager enables you discover computers on your network or in a cloud, download software from the Centrify website or a network location, analyze discovered computers, resolves issues, deploy agents, and manage auditing.

For more information about using Deployment Manager, see the Planning and Deployment Guide.

Installing the agent silently using a configuration file

You can automate agent installation by running the install.sh script in non-interactive mode:

install.sh -n

196

Page 199: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Installing the agent silently using a configuration file

In this mode, the script uses configuration details specified in the centrifyda-install.cfg file. If this file is not found, the install.sh script uses its built-in default values.

To specify configuration values, edit the sample centrifyda-install.cfg file in its default location, or create a new text file with the same name, and then run the install.sh script.

In the file, INSTALL=Y installs the agent, and INSTALL=U upgrades the agent.

By default, the script returns an exit code of 0 if the operation is successful. To return exit codes that provide more detailed information about the result, use:

install.sh -n --custom_rc

This return code

Indicates

CODE_SIN=0 Successful install

CODE_SUP=0 Successful upgrade

CODE_SUN=0 Successful uninstall

CODE_NIN=24 Did nothing during install

CODE_NUN=25 Did nothing during uninstall

CODE_EIN=26 Error during install

CODE_EUP=27 Error during upgrade

CODE_EUN=28 Error during uninstall

CODE_ESU=29 Error during setup; for example, unsupported operating environment or invalid arguments

Chapter 9 • Installing the UNIX agent on remote computers 197

Page 200: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using other programs to install the UNIX agent

Using other programs to install the UNIX agentAuditing-related files are bundled with the core Centrify agent files into a platform-specific software package. You must install the Centrify agent on the audited computer before you enable the auditing service.

To install auditing using a native installation mechanism:

1 Log on as a user with root privileges.

2 If you want to install from a CD and the drive is not mounted automatically, use the OS-specific command to mount the cdrom device.

3 Copy the appropriate package to a local directory.

For Solaris 10:cp /cdrom/cdrom0/Unix/centrifyda-n.n.n-sol10-sparc-local.tgz .

For Red Hat Enterprise Linux:cp /mnt/cdrom/Unix/centrifyda-n.n.n-rhel5-x86_64.rpm .

For SuSE Linux:cp /mnt/cdrom/Unix/centrifyda-n.n.n-suse11-x86_64.rpm .

4 If the software package is a compressed file, unzip and extract the contents. For example, on Solaris:gunzip -d centrifyda-n.n.n-sol10-local.tgztar -xf centrifyda-n.n.n-sol10-sparc-local.tar

5 Run the installation command appropriate to the operating environment.

For Red Hat Linux, you can use:rpm –ivh centrifyda-n.n.n-rhel5-x86_64.rpm

For SuSE Linux, you can use:rpm –ivh centrifyda-n.n.n-suse11-x86_64.rpm

For Solaris, you can use:pkgadd –d CentrifyDA -a admin

Note You can also use other programs, such as SMIT or YAST, to install the agent package.

Auditing Administrator’s Guide 198

Page 201: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Using other programs to install the UNIX agent

6 If you using an installation with a name other than DefaultInstallation, you need to configure it with dacontrol or using group policy.

Note If there is an installation with the name DefaultInstallation the UNIX agent uses it by default. For more information about specifying the installation, see “Configuring the installation for an agent” on page 172.

7 After installing the package, use dainfo to verify that auditing is installed and running. You should see output similar to the following:Pinging adclient: adclient is availableDaemon status: OnlineCurrent collector: DC2008r2-LG.pistolas.org:5063:HOST/[email protected] offline store size: 0.00 BytesSession despool rate: 0.00 Bytes/secondAudit trail offline store size: 0.00 BytesAudit trail despool rate: 0.00 Bytes/secondGetting offline database information: Size on disk: 52.00 KB Database filesystem use: 3.06 GB used, 15.52 GB total, 12.45 GB freeDirectAudit NSS module: ActiveUser (root) audited status: YesDirectAudit is not configured for per-command auditing.

Chapter 9 • Installing the UNIX agent on remote computers 199

Page 202: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Chapter 10

Permissions required to perform administrative and auditing tasks

This chapter describes the permissions required to perform various auditing-related activities.

The following topics are covered:

Setting and synchronizing audit-related permissions

Installation permissions

Management database permissions

Audit store and audit store database permissions

Audit role permissions

Auditor permissions

Setting and synchronizing audit-related permissions

As a Master Auditor, you can set the permissions that control what all other administrators and auditors can do. In most cases, you set these permissions by making selections in Audit Manager. Your selections are saved in the management database for each installation, then published in Active Directory whenever you synchronize the management database with the service connection point for the installation.

The permissions you can set consist of a specific action that can be taken, a scope to which the action applies, and the specific Active Directory user or group to which you are granting the permission.

For example, a permission might specify an action, such as ability to modify a name or detach a database with a scope such as a specific installation or audit store database. For each action and scope, you select the Active Directory user or group to be granted that permission. After users or groups are granted a permission, they are called a trustee for that action and scope.

200

Page 203: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Installation permissions

Installation permissionsInstallation permissions allow users or groups to modify different aspects of an installation’s properties. By default, the Master Auditor and the management database administrator have Full Control over the installation and can assign the following permissions to other users and groups:

This permission Enables trustees to do this

Full Control Perform all administrative tasks on the selected installation and assign permissions to other users and groups.

Change Permissions Add, modify, or remove Active Directory users and groups that have specific permissions.

A user or group granted this permission can display the properties for the installation, then click the Security tab to select permissions for other users and groups.

Modify Name Modify the name of the selected installation.

A user or group granted this permission can display the properties for the installation, then click the General tab to change the installation name.

Manage Management Database List

Add or remove a management database for the selected installation.

A user or group granted this permission can right-click the installation name in Audit Manager and select Management Databases to add or remove a management database.

Deleting the management database from Microsoft SQL Server requires additional SQL Server permissions.

Chapter 10 • Permissions required to perform administrative and auditing tasks 201

Page 204: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Installation permissions

Manage Audit Store List Add, modify, or remove audit stores and audit store databases for the selected installation.

A user or group granted this permission can use the Add Audit Store wizard or right-click the installation name in Audit Manager, select Management Databases, then click Properties to add or remove sites or subnets associated with the installation.

Manage Collectors Add, modify, or remove collectors for the selected installation.

Manage Audited Systems Add, modify, or remove audited computers for the selected installation.

Manage Audit Roles Add, modify, or remove audit roles for the selected installation.

Manage Queries Add, modify, or remove queries for the selected installation.

Manage Publications Add, modify, or remove publication locations in Active Directory for the service connection point associated with the selected installation.

A user or group granted this permission can display the properties for the installation, then click the Publication tab to change the publication location in Active Directory for the installation.

A user or group granted this permission can also update the information stored in Active Directory to keep the information in Active Directory synchronized with the information stored in the management database. However, users or groups with this permission must have sufficient Windows rights to be able to update objects in Active Directory.

This permission Enables trustees to do this

Auditing Administrator’s Guide 202

Page 205: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Installation permissions

Manage License Add or remove license keys for an installation.

A user or group granted this permission can display the properties for the installation, click the General tab, then click Details to manage licenses for the installation.

Modify Notification Enable or disable the audit notification message for the selected installation.

A user or group granted this permission can display the properties for the installation, then click the Notification tab to manage the notification message and image for the installation.

Modify Audit Options Enable or disable video capture auditing for the selected installation.

Control whether users are allowed to update the review status of their own sessions.

Control whether users are allowed to delete their own sessions.

A user or group granted this permission can display the properties for the installation, then click the Audit Options tab to manage installation-wide auditing options.

View Enable read-only permission for the selected installation.

If a user has only View permission, they can see all the auditing components in the Audit Manager console, but they do not have access to audited sessions nor can they change any installation details.

This permission Enables trustees to do this

Chapter 10 • Permissions required to perform administrative and auditing tasks 203

Page 206: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Management database permissions

Setting installation permissions

You can set installation permissions for a specific installation, by selecting the installation name in Audit Manager.

To set permissions on an installation:

1 Open Audit Manager and select the installation name.

2 Right-click, then click Properties.

3 Click the Security tab.

4 Click Add to open Select Users and Groups.

5 Type the user or group name who should be granted installation permissions, then click OK.

You can add multiple users or groups from the Select Users or Groups dialog box. You can also type part of the name, then click Check Names to look up user and group names.

6 Select the specific permissions you want to grant to the selected user or group.

Management database permissionsManagement database permissions allow users or groups to modify different aspects of an installation’s management database. By default, the Master Auditor and the management database administrator have

Auditing Administrator’s Guide 204

Page 207: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Management database permissions

Full Control over the management database and can assign the following permissions to other users and groups:

This permission Enables trustees to do this

Full Control Perform all administrative tasks on the selected management database and assign permissions to other users and groups.

Change Permissions Add, modify, or remove Active Directory users and groups that have specific permissions.

A user or group granted this permission can display the properties for the management database, then click the Security tab to select permissions for other users and groups.

Modify Name Modify the name displayed for the selected management database.

A user or group granted this permission can display the properties for the management database, then click the General tab to change the management database name.

Manage Scopes Add, modify, or remove sites or subnets for a management database.

A user or group granted this permission can display the properties for the management database, then click the Scope tab to add or remove sites and subnets.

Remove Database Remove a management database from an installation.

Deleting the management database from Microsoft SQL Server requires additional SQL Server permissions.

Chapter 10 • Permissions required to perform administrative and auditing tasks 205

Page 208: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Audit store and audit store database permissions

Setting management database permissions

You can set management database permissions for a specific installation, by selecting the installation name in Audit Manager.

To set permissions on an management database:

1 Open Audit Manager and select the installation name.

2 Right-click, then click Management Databases.

3 Select the management database, click Properties, then click the Security tab.

4 Click Add, type the user or group name who should be granted permissions, then click OK.

5 Select the specific permissions you want to grant to the selected user or group.

Audit store and audit store database permissions

Audit store permissions allow users or groups to modify different aspects of an audit store or audit store database. By default, the Master Auditor and the audit store database administrator have Full

Manage SQL Logins Add or remove the Allowed incoming users for the selected management database.

A user or group granted this permission can display properties for the management database, then click the Advanced tab to add or remove allowed accounts, or to change the outgoing account or authentication type.

Manage Database Trace Enable, disable, or export database traces for the selected management database.

This permission Enables trustees to do this

Auditing Administrator’s Guide 206

Page 209: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Audit store and audit store database permissions

Control over the audit store and its database and can assign the following permissions to other users and groups:

This permission Enables trustees to do this

Full Control Perform all administrative tasks on the selected audit store database and assign permissions to other users and groups.

Change Permissions Add, modify, or remove Active Directory users and groups that have specific permissions.

A user or group granted this permission can display the properties for the audit store, then click the Security tab to select permissions for other users and groups.

Modify Name Modify the name displayed for the selected audit store.

A user or group granted this permission can display the properties for the audit store, then click the General tab to change the audit store name.

Manage Scopes Add, modify, or remove sites or subnets for the audit store.

A user or group granted this permission can display the properties for the audit store, then click the Scope tab to add or remove sites and subnets.

Manage SQL Logins Add or remove the allowed incoming collectors and management database logins for the selected audit store database.

A user or group granted this permission can display properties for the audit store database, then click the Advanced tab to add or remove accounts for collectors and management databases.

Chapter 10 • Permissions required to perform administrative and auditing tasks 207

Page 210: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Audit role permissions

Audit role permissionsAudit role permissions allow users or groups to modify different aspects of an audit role. By default, the Master Auditor has Full Control

Manage Collectors Add, modify, or remove trusted collectors for the audit store.

A user or group granted this permission can display properties for the audit store, then click the Advanced tab to add or remove accounts trusted collectors.

Manage Audited Systems Add, modify, or remove trusted audited computers for the audit store.

A user or group granted this permission can display properties for the audit store, then click the Advanced tab to add or remove accounts trusted audited computers.

Manage Databases Add, attach, detach, or delete audit store databases for the selected audit store.

Manage Database Trace Enable, disable, or export database traces for the selected audit store.

This permission Enables trustees to do this

Auditing Administrator’s Guide 208

Page 211: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Audit role permissions

over the audit roles and can assign the following permissions to other users and groups:

This permission Enables trustees to do this

Full Control Perform all administrative tasks on the selected audit role and assign permissions to other users and groups.

Change Permissions Add, modify, or remove Active Directory users and groups that have specific permissions.

A user or group granted this permission can display the properties for the audit role, then click the Security tab to select permissions for other users and groups.

Change Role Membership Add, modify, or remove Active Directory users and groups that are assigned to the selected role.

A user or group granted this permission can use the Add Audit Role wizard to assign users and groups to an audit role or select an audit role name, right-click, then select Assign Users and Groups to modify the role membership.

Change Role Definition Modify the name, description, access, or privileges for the selected audit role.

A user or group granted this permission can display the properties for the audit role, then:

• Click the General tab to modify the role name or description.

• Click the Access tab to modify the type of session and other criteria.

• Click the Privileges tab to modify hat users and groups assigned to the role can do.

Chapter 10 • Permissions required to perform administrative and auditing tasks 209

Page 212: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Auditor permissions

Auditor permissionsAuditor permissions allow users or groups to view, create, share, and delete queries. For an installation, the Master Auditor can control access to Audit Analyzer and queries using the Manage Queries permission and the assignment of audit roles. The privileges associated with an audit role also control whether auditor can update the review status or replay sessions. By default, the Master Auditor has Full Control over the auditor permissions and audit roles and can assign the following permissions to other users and groups:

This permission Enables trustees to do this

Full Control Perform all administrative tasks on the selected query and assign permissions to other users and groups.

Change Permissions Add, modify, or remove Active Directory users and groups that have specific permissions.

A user or group granted this permission can display the properties for the query, then click the Security tab to select permissions for other users and groups.

Read Read the selected query definition, session results, and indexed commands.

Delete Delete the selected query definition, session results, and indexed commands.

Modify Modify the selected query definition, session results, and indexed commands.

Auditing Administrator’s Guide 210

Page 213: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Glossary

Administrator console An earlier version of the Audit Manager console used to configure and monitor audit installations and to grant and manage auditor rights for users and groups.

Audit Analyzer console A GUI that auditors use to search audit data. The console enables auditors to query audit store databases, select sessions to replay, and flag sessions for follow-up.

Audit Manager console The management console that is used to configure and monitor the audit installation and to grant and manage auditor rights for users and groups.

Audit management database The audit management database is a Microsoft SQL Server database instance that keeps track of all of the components in a single audit installation. When users query and display audit data using Audit Analyzer, the audit management database connects to the appropriate audit stores to respond to the requests. In previous versions, the component was called the audit server.

Audit management server The Windows service that collects audit trail events when there are no audit store databases available. Only one instance of this service should run for a single audit installation.

Audit role A specification that defines a set of audit data and access privileges for an assigned set of users or groups. Users or groups who are assigned to one or more audit roles are identified as auditors. An administrator creates different audit roles to give auditors specific access rights to appropriate audit data.

Audit store A component of the auditing infrastructure that defines a scope of audit data in a Microsoft SQL Server database. An audit store can encompass an entire Active Directory site or a specific subnet. Only one SQL Server database can be actively receiving audit data from collectors at a time. However, an audit store can have multiple attached databases. All attached databases in the audit store are available to the audit management database, which presents audit data to auditors in response to requests from Audit Analyzer. Typically, each Active Directory site has one audit store.

Audit store database A Microsoft SQL Server database that contains captured session data.

Audited computer A Windows, Linux, or UNIX computer that has an agent installed to capture user activity. When auditing is enabled, it starts when a user logs on.

Audited system Another term used interchangeably with audited computer to describe a Windows, Linux, or UNIX computer that has an agent installed to capture user activity.

Auditor console An earlier version of the Audit Analyzer console that auditors use to search audit data, select sessions to replay, flag sessions for follow-up, and query audit store databases.

Audit trail The list of commands that were audited.

211

Page 214: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Centrify UNIX agent The collection of components on a UNIX computer responsible for access control, privilege management, and sending audit data to a collector. The Centrify UNIX agent encompasses all required and optional services that provide identity broker and privilege elevation and auditing features on Linux and UNIX computers. On audited UNIX computers, these components include the service that intercepts traffic (cdash), the data collection service (dad), the agent configuration file (centrifyda.conf), and command line programs.

Centrify Windows agent The collection of components on an audited Windows computer responsible for sending audit data to a collector. On Windows, these components include the service that intercepts traffic (wash), the data collection service (wdad), and the agent configuration control panel.

Collector A Windows service that collects audit data from audited systems and sends it to an audit store.

Common component A Windows service that captures diagnostic log information from all auditing-related components.

DirectAudit installation A named collection of audited computers, collectors, audit stores, and an audit management database that interact. Each installation has a Master Auditor with full control over all of the components in the installation. The installation defines the boundary of audit data available. An organization can have multiple installations. For example, two corporate divisions can deploy isolated installations; or a test installation can be maintained separately from the production deployment.

DirectAudit UNIX agent The components on an audited UNIX computer responsible for sending audit data to a collector. On UNIX,

these components include the auditing shell wrapper (cdash), the data collection service (dad), the agent configuration file, and command line programs.

Centrify Identity Broker Service UNIX agent The components on a UNIX system responsible for authentication and authorization services. The core component that provides these services on a managed computer is the adclient process. This agent is required for auditing on UNIX computers because it communicates with Active Directory to authenticate user credentials and evaluate role assignments.

Installation A named collection of audited computers, collectors, audit stores, and an audit management database that interact. Each installation has a Master Auditor with full control over all of the components in the installation. The installation defines the boundary of audit data available. An organization can have multiple installations. For example, two corporate divisions can deploy isolated installations; or a test installation can be maintained separately from the production deployment.

Management database The Microsoft SQL Server database instance that keeps track of all of the components in a single installation. When users query and display audit data, the management database connects to the appropriate audit stores to respond to the requests. In previous versions, the component was called the audit server.

Master Auditor role The user account that has full administrative control over an installation. You cannot modify the permissions associated with the Master Auditor role. You can change who is assigned to the role.

Auditing Administrator’s Guide 212

Page 215: Auditing Administrator’s Guide - Centrify Administrator’s Guide February 2018 (update for release 2017.3) Centrify Corporation Legal notice This document and the software described

Reporting database A database that contains a central, partial replica of the data stored in the management database and audit store databases. The data is optimized for generating reports. Event notifications can be created for installations that have reporting enabled.

• Glossary 213


Recommended